Static task
static1
Behavioral task
behavioral1
Sample
374e9571e389b70192e638074e98f52f5808342177939c0f1c6b18d8160ea589.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
374e9571e389b70192e638074e98f52f5808342177939c0f1c6b18d8160ea589.exe
Resource
win10v2004-20220901-en
General
-
Target
374e9571e389b70192e638074e98f52f5808342177939c0f1c6b18d8160ea589
-
Size
288KB
-
MD5
512e8e63575fd07ba656627409c217c0
-
SHA1
13de6e275d9f091fcdb77daa52c40e290c33eb3c
-
SHA256
374e9571e389b70192e638074e98f52f5808342177939c0f1c6b18d8160ea589
-
SHA512
fc2ddeb2b2bcdf33eb8c838a709d97d41b67b8228f539d7366343ecf4bca1f0bcf7110bf7d409f48ecad965815ce79c371be533c639e318bcb2ea1f325ec8891
-
SSDEEP
3072:6WILTFjKOHgsgJYUsH+qV44HZNtgv8GIbvgTrlXIDUIS1w+BpTG/DH+DSAgMvr:lu5I364Ur9vgTBXIAIGxRGSDS
Malware Config
Signatures
Files
-
374e9571e389b70192e638074e98f52f5808342177939c0f1c6b18d8160ea589.exe windows x86
89aa21291862a6491da93eab6ecd7fdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
LoadLibraryA
GetProcAddress
IsBadWritePtr
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
FatalAppExitA
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetCurrentThread
GetLastError
TlsGetValue
SetLastError
LCMapStringW
GetStringTypeA
GetModuleHandleW
GetCommandLineW
GetVersion
WriteFile
SetFilePointer
CloseHandle
ExitProcess
LocalAlloc
LocalFree
LeaveCriticalSection
Sleep
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetStringTypeW
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
user32
GetDlgCtrlID
FrameRect
GetDoubleClickTime
SetParent
SetCursor
WindowFromPoint
DispatchMessageW
TranslateMessage
GetMessageW
LoadIconA
IsClipboardFormatAvailable
GetClipboardData
CopyAcceleratorTableW
SetMenuItemInfoA
GetMenuItemInfoA
GetMessageTime
SetScrollInfo
ScrollWindow
GetTopWindow
GetSysColor
DrawTextW
CreateWindowExW
LockWindowUpdate
DrawIcon
SetForegroundWindow
advapi32
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
SetServiceStatus
AdjustTokenPrivileges
LookupPrivilegeValueW
CloseServiceHandle
ControlService
RegDeleteKeyW
RegOpenKeyW
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
RegCloseKey
ws2_32
getsockname
htons
shutdown
setsockopt
getpeername
gethostname
gethostbyname
send
WSACleanup
socket
WSAStartup
sendto
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 26KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 199KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE