Static task
static1
Behavioral task
behavioral1
Sample
730aa3dba72d84f288e01b799af3de551529e55e2b8b37aa110de2544858f068.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
730aa3dba72d84f288e01b799af3de551529e55e2b8b37aa110de2544858f068.exe
Resource
win10v2004-20220901-en
General
-
Target
730aa3dba72d84f288e01b799af3de551529e55e2b8b37aa110de2544858f068
-
Size
552KB
-
MD5
6ad405b42ef7ce33215263a19abc2e30
-
SHA1
4abad25409a05c76be86d92dd04271ade6d9ec12
-
SHA256
730aa3dba72d84f288e01b799af3de551529e55e2b8b37aa110de2544858f068
-
SHA512
36660a3c0eab22a82e6723b5c998805b9a33910aedab67cbe7b23e372ab01219a144ff1bb615ed87d9a6b12dccbaf990da71238bcd671660bd1c67e8c6269c41
-
SSDEEP
12288:GrpvXwnWJX0CE3cveqVIfKrWqnROQeNJIHfY:UAy430eqVIfKl4QOJE
Malware Config
Signatures
Files
-
730aa3dba72d84f288e01b799af3de551529e55e2b8b37aa110de2544858f068.exe windows x86
8e1be99146d3c3881d79f991279d1ef9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyW
InitiateSystemShutdownW
CryptDecrypt
CryptSetProviderExW
RegEnumKeyW
CryptVerifySignatureW
CryptDuplicateKey
StartServiceA
RegEnumValueW
shell32
SHInvokePrinterCommandA
FindExecutableW
SHGetSpecialFolderLocation
gdi32
StartDocA
CreateHalftonePalette
CreateBitmapIndirect
StretchDIBits
GetEnhMetaFileDescriptionW
SetColorAdjustment
EnumICMProfilesW
MoveToEx
Rectangle
GetWinMetaFileBits
OffsetWindowOrgEx
TextOutW
CreateRoundRectRgn
SwapBuffers
user32
GetMenuStringA
RegisterClipboardFormatA
CloseWindowStation
TrackMouseEvent
RegisterClassExA
TranslateMDISysAccel
InSendMessage
GetClipboardFormatNameW
RegisterClassA
SetThreadDesktop
EnumPropsW
kernel32
TlsFree
GetUserDefaultLCID
CreateProcessW
HeapAlloc
GetCommandLineA
VirtualProtect
GetCurrentProcessId
GetLocaleInfoW
CompareStringA
SetConsoleCP
GetLastError
InterlockedExchange
GetTimeZoneInformation
OpenMutexA
GetOEMCP
HeapSize
HeapReAlloc
VirtualAlloc
CompareStringW
SetFilePointer
IsBadWritePtr
SetThreadIdealProcessor
SetEnvironmentVariableA
EnumSystemLocalesA
HeapDestroy
IsValidCodePage
TlsAlloc
GetPrivateProfileSectionNamesA
WriteFile
GetStringTypeW
ReadFile
GetModuleFileNameA
LCMapStringW
IsValidLocale
EnterCriticalSection
RtlUnwind
GetModuleFileNameW
GetDiskFreeSpaceExA
GetTimeFormatA
VirtualFree
lstrcmpi
QueryPerformanceCounter
GetStdHandle
TerminateProcess
FreeEnvironmentStringsA
UnhandledExceptionFilter
CloseHandle
GetEnvironmentStrings
LCMapStringA
TlsSetValue
GetCurrentProcess
GetStartupInfoW
SetThreadContext
CreateMutexA
ReadConsoleOutputW
GetLocaleInfoA
GetFileType
WriteConsoleOutputAttribute
FreeEnvironmentStringsW
EnumTimeFormatsW
GetProcAddress
GetNamedPipeInfo
GetACP
GetStartupInfoA
VirtualQuery
GetModuleHandleA
SetEndOfFile
OpenProcess
GetCurrentThread
GetStringTypeA
LeaveCriticalSection
HeapCreate
WideCharToMultiByte
GetDateFormatA
GetCPInfo
ExitProcess
DeleteCriticalSection
SetHandleCount
LoadLibraryA
MultiByteToWideChar
CreatePipe
GetSystemTimeAsFileTime
IsBadReadPtr
WriteConsoleA
CreateRemoteThread
FlushFileBuffers
GetSystemInfo
GetDateFormatW
SetEnvironmentVariableW
HeapFree
GetEnvironmentStringsW
WriteConsoleOutputA
InitializeCriticalSection
GetTickCount
GetCommandLineW
TlsGetValue
RemoveDirectoryW
GetCurrentThreadId
SetStdHandle
GetVersionExA
SetLastError
FoldStringW
comctl32
InitCommonControlsEx
Sections
.text Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ