Static task
static1
Behavioral task
behavioral1
Sample
164a8eb2d209d5a7168060030c15856fd51b238bcabd503c7ecb2ab7c382d1ac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
164a8eb2d209d5a7168060030c15856fd51b238bcabd503c7ecb2ab7c382d1ac.exe
Resource
win10v2004-20220812-en
General
-
Target
164a8eb2d209d5a7168060030c15856fd51b238bcabd503c7ecb2ab7c382d1ac
-
Size
96KB
-
MD5
0800edff1703d2de481936274adac530
-
SHA1
a5dd05b6d644c97ca49827b398595d30827b035e
-
SHA256
164a8eb2d209d5a7168060030c15856fd51b238bcabd503c7ecb2ab7c382d1ac
-
SHA512
90509dbc39a7e6e8122bac634ec89731de0ffa18cd2ab3ebb79215962e20e01056106520dfc2b8a323140c78c4a789731bc7dbb4bd78489ce24b2a850d25f740
-
SSDEEP
1536:ZoYHwORPkWowuR8DSY+A37feaCMJDmYsLIb4PvYqHB/Age:vHjRpoCSDADeak7dJHB/A1
Malware Config
Signatures
Files
-
164a8eb2d209d5a7168060030c15856fd51b238bcabd503c7ecb2ab7c382d1ac.exe windows x86
07e4fe7e23055d2eda91e4f9a2153416
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
CloseHandle
GetVersionExA
FindNextFileA
WaitForSingleObject
SetCurrentDirectoryA
CreateProcessA
GetCurrentProcess
CreateFileA
ReadFile
FindClose
FindFirstFileA
ExitProcess
MultiByteToWideChar
LCMapStringA
SetStdHandle
GetProcAddress
FlushFileBuffers
HeapReAlloc
VirtualAlloc
SetFilePointer
GetLastError
HeapAlloc
GetStringTypeA
WriteFile
GetStringTypeW
HeapFree
VirtualFree
RtlUnwind
HeapDestroy
LoadLibraryA
Sleep
TerminateProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
GetEnvironmentVariableA
HeapCreate
LCMapStringW
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
user32
GetMessageA
DispatchMessageA
TranslateMessage
ShowWindow
PostMessageA
GetDlgItem
PeekMessageA
CreateDialogParamA
ExitWindowsEx
MsgWaitForMultipleObjects
SendMessageA
SetDlgItemTextA
KillTimer
EnableWindow
MessageBoxA
DestroyWindow
SetTimer
advapi32
RegDeleteValueA
RegQueryValueExA
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueA
RegOpenKeyExA
OpenProcessToken
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ