Static task
static1
Behavioral task
behavioral1
Sample
f13c0a7d1616120a54f264b195b614934a27dd2c7ad1703fe4039686ab93205f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f13c0a7d1616120a54f264b195b614934a27dd2c7ad1703fe4039686ab93205f.exe
Resource
win10v2004-20220812-en
General
-
Target
f13c0a7d1616120a54f264b195b614934a27dd2c7ad1703fe4039686ab93205f
-
Size
148KB
-
MD5
4f3e7f05311250c85d90868fc8481614
-
SHA1
955c56b2b1aa8bf4a17c959879dacb37b97cbc6f
-
SHA256
f13c0a7d1616120a54f264b195b614934a27dd2c7ad1703fe4039686ab93205f
-
SHA512
38afa0c74c318a30030aeda13d162e898a512d88030cb0c4384f5dd65ce51ebd41c35f3f822101894a6d6c4db082542365f70af9f506f2e6e5a64ee3e80aff6b
-
SSDEEP
3072:uMKE01oib5tKlK5C0SZ3L6JC+iw46lFE5MmXI2PEDlY:uM5gb5tc8PSZ3GJF46lx4IP5Y
Malware Config
Signatures
Files
-
f13c0a7d1616120a54f264b195b614934a27dd2c7ad1703fe4039686ab93205f.exe windows x86
6d6ae2f10d61dca5a8a15b3a339346f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
OpenProcess
WriteFile
SetFileTime
GetFileAttributesExA
DuplicateHandle
WinExec
GetLastError
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
CloseHandle
GetSystemDirectoryA
CreateFileA
GetVersionExA
GetProcAddress
LoadLibraryA
Sleep
user32
DispatchMessageA
GetDesktopWindow
TranslateMessage
GetMessageA
RegisterClassExA
ShowWindow
CreateWindowExA
DefWindowProcA
PostQuitMessage
advapi32
LookupAccountNameA
RegQueryValueExA
RegCloseKey
CreateServiceA
CloseServiceHandle
OpenSCManagerA
ConvertSidToStringSidA
GetUserNameA
StartServiceA
OpenServiceA
DeleteService
RegOpenKeyExA
shlwapi
SHDeleteKeyA
SHSetValueA
msvcrt
_exit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
rand
sprintf
_access
_except_handler3
srand
time
fclose
fflush
fwrite
fopen
??3@YAXPAX@Z
??2@YAPAXI@Z
_stricmp
_XcptFilter
exit
_acmdln
__getmainargs
dbghelp
ImageNtHeader
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ