Static task
static1
Behavioral task
behavioral1
Sample
48605c18e16a64bdf8088a8486936310aeba0c46ccc1ad7abbfeec3060a01387.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48605c18e16a64bdf8088a8486936310aeba0c46ccc1ad7abbfeec3060a01387.exe
Resource
win10v2004-20220812-en
General
-
Target
48605c18e16a64bdf8088a8486936310aeba0c46ccc1ad7abbfeec3060a01387
-
Size
292KB
-
MD5
67327487553d63192fb25460b90a3670
-
SHA1
f6a76c9103b7735ffb94073e675a7d2e2dcba98f
-
SHA256
48605c18e16a64bdf8088a8486936310aeba0c46ccc1ad7abbfeec3060a01387
-
SHA512
3caa82d25b8a7a99ca57d47697f20025a4742ef23603b22b3e1e20ee12d6e09fbdbb2ed044cac796f6013d36f62011dcefec6bc0dbf223605b3c708b3d393e56
-
SSDEEP
6144:eJzCHxKmLT7AVPyNpZ4yVbNIkI0vKJPvHSyOJNF6jrfe/MXMBOBDgt:mzCHwqTsE4y1NI1pJHHSy0NF0rfOaMM6
Malware Config
Signatures
Files
-
48605c18e16a64bdf8088a8486936310aeba0c46ccc1ad7abbfeec3060a01387.exe windows x86
48cf9f66ef10f418e49cb9255c3bae42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalSize
GetTickCount
SetCurrentDirectoryW
GetLogicalDriveStringsW
GetFullPathNameW
GetFileAttributesW
GetVolumeInformationA
GetVersionExA
SystemTimeToTzSpecificLocalTime
EnumResourceLanguagesA
GetOverlappedResult
GetNumberOfConsoleInputEvents
GetProfileIntW
GetOEMCP
SetProcessWorkingSetSize
HeapCreate
VirtualProtect
GetModuleHandleA
TerminateProcess
CreateMailslotA
UpdateResourceA
CallNamedPipeA
TryEnterCriticalSection
GetProcessAffinityMask
lstrlenA
GetStartupInfoA
user32
RegisterClipboardFormatA
GetMenuItemRect
CharLowerBuffW
IsDialogMessageW
PtInRect
GetTabbedTextExtentA
CharPrevW
CharUpperA
DrawFocusRect
GetClipboardFormatNameA
wvsprintfA
GetMenuStringA
GetCaretPos
RegisterClassW
GetKeyNameTextA
SetMenuInfo
CharNextW
ShowCursor
GetWindowTextW
gdi32
Polyline
comdlg32
PageSetupDlgA
PageSetupDlgW
GetOpenFileNameW
FindTextA
advapi32
RegEnumKeyExA
RevertToSelf
AbortSystemShutdownW
RegCreateKeyW
OpenThreadToken
OpenEventLogW
GetSecurityDescriptorDacl
AbortSystemShutdownA
GetSecurityDescriptorGroup
AllocateAndInitializeSid
CryptDestroyHash
RegEnumKeyW
RegConnectRegistryW
RegQueryInfoKeyA
QueryServiceStatus
ImpersonateSelf
SetFileSecurityW
RegDeleteValueA
RegFlushKey
RegOpenKeyExA
GetAclInformation
RegConnectRegistryA
AdjustTokenPrivileges
shell32
DragAcceptFiles
ExtractAssociatedIconA
DragQueryFileW
SHGetDesktopFolder
ole32
WriteClassStg
oleaut32
LoadTypeLibEx
VariantInit
SysAllocString
GetActiveObject
comctl32
ImageList_GetImageCount
shlwapi
SHQueryValueExW
wnsprintfA
PathRemoveBackslashW
SHGetValueW
StrStrIA
StrFormatKBSizeW
PathGetDriveNumberW
SHRegOpenUSKeyW
StrCmpNA
StrPBrkW
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 272KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE