Static task
static1
Behavioral task
behavioral1
Sample
7a25566f5ef8f62296af5f59f7757d5bc40678390ffe62ceb387c9ff040d5fae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a25566f5ef8f62296af5f59f7757d5bc40678390ffe62ceb387c9ff040d5fae.exe
Resource
win10v2004-20220812-en
General
-
Target
7a25566f5ef8f62296af5f59f7757d5bc40678390ffe62ceb387c9ff040d5fae
-
Size
291KB
-
MD5
658461208e9ab96987508b997b60bde0
-
SHA1
5b309f0f6a311d25c7ce0e4e616226c9972c96be
-
SHA256
7a25566f5ef8f62296af5f59f7757d5bc40678390ffe62ceb387c9ff040d5fae
-
SHA512
1ec52b78f9785ac73bbd932f562430a7487d7f10f50b3eccd77d58fd9869b998e59bebda451a7aa01baac08b708fac58d99d6273f5dc63c4c5cdf99661f07975
-
SSDEEP
6144:7u+rcSv87fTte4pbOEJRM2obaZLBwJv6acKM6kpwsl:S+AS0ftJVRxOew5IKM6
Malware Config
Signatures
Files
-
7a25566f5ef8f62296af5f59f7757d5bc40678390ffe62ceb387c9ff040d5fae.exe windows x86
02134cc5f94f57817f2de254409291b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetCurrentProcess
SetFileTime
MoveFileW
FlushFileBuffers
SetFilePointer
SetEndOfFile
GetFileType
CreateFileA
CreateFileW
ReadFile
SetLastError
WriteFile
GetDriveTypeA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleW
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
MoveFileA
DeleteFileA
DeleteFileW
DeviceIoControl
CreateDirectoryA
CreateDirectoryW
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
FindClose
FindNextFileA
FindFirstFileA
FindNextFileW
FindFirstFileW
FormatMessageW
GetFullPathNameA
GetModuleFileNameA
GetModuleFileNameW
MultiByteToWideChar
SetErrorMode
FreeLibrary
LoadLibraryW
LoadLibraryExW
GetCurrentProcessId
CompareStringA
SetThreadPriority
GetCurrentThread
SetPriorityClass
LocalFileTimeToFileTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetSystemTime
WideCharToMultiByte
CompareStringW
IsDBCSLeadByte
GetCPInfo
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
GetLocaleInfoA
LocalFree
SetConsoleCtrlHandler
Sleep
GetLastError
GetCurrentDirectoryW
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleW
GetVersionExW
GetCommandLineW
GetStringTypeW
GetStringTypeA
GetConsoleCP
RtlUnwind
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
RaiseException
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapCreate
GetACP
GetOEMCP
IsValidCodePage
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
user32
CharLowerW
CharUpperA
CharLowerA
LoadStringW
CharUpperW
CharToOemBuffW
CharToOemA
OemToCharA
OemToCharBuffA
ExitWindowsEx
advapi32
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetFileSecurityW
SetFileSecurityA
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ybkxopy Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE