Static task
static1
Behavioral task
behavioral1
Sample
4fd9dcc0f25eec1ede57d4f24487179a8937176de25993520798031fae21f1ca.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4fd9dcc0f25eec1ede57d4f24487179a8937176de25993520798031fae21f1ca.exe
Resource
win10v2004-20220812-en
General
-
Target
4fd9dcc0f25eec1ede57d4f24487179a8937176de25993520798031fae21f1ca
-
Size
105KB
-
MD5
13b2a0f1997ff2a2cc9649be008f1aff
-
SHA1
88dfc2385a0ffe5954698f7ef18d225b357be5a6
-
SHA256
4fd9dcc0f25eec1ede57d4f24487179a8937176de25993520798031fae21f1ca
-
SHA512
45148c43a89baa658b20153c98e104bb5aee0d17c570eee64d003ee0affa840139eecc85901f134a8d7e1243b269fd988a92669949aaea4b328be5909c6ff113
-
SSDEEP
1536:C+/bUT700oVkBsZxuhilQFph4Ajpntn9aejLikxIa3LfgWRxUIdg6as9OL6+S51V:C+10WkequO4ALnQejGkHc/ID7
Malware Config
Signatures
Files
-
4fd9dcc0f25eec1ede57d4f24487179a8937176de25993520798031fae21f1ca.exe windows x86
3a884b043224776aecaf2ceb78513e6f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
Sleep
GetVersion
VirtualFree
GetThreadLocale
lstrcatA
FormatMessageA
LocalFileTimeToFileTime
GetStartupInfoA
MultiByteToWideChar
OpenProcess
GetCurrentProcessId
lstrcpyA
GetVersionExW
LoadResource
GetSystemTime
DeviceIoControl
GetFileType
GetExitCodeProcess
MulDiv
GetModuleHandleW
GetSystemTimeAsFileTime
VirtualProtect
GetStringTypeExA
GetTimeZoneInformation
GetOEMCP
LocalAlloc
GetEnvironmentVariableA
DeleteFileA
IsDBCSLeadByte
GetCurrentProcess
CompareFileTime
CompareStringW
GetSystemDirectoryW
GetLocaleInfoA
GetUserDefaultLangID
GlobalFree
UnhandledExceptionFilter
lstrcmpA
EnumCalendarInfoA
RaiseException
GetTempPathW
lstrcmpiW
GetPrivateProfileStringA
IsDebuggerPresent
FreeEnvironmentStringsA
GetSystemDirectoryA
LocalFree
GetCommandLineW
GetTempPathA
CopyFileA
SetHandleCount
GetConsoleOutputCP
ExitProcess
GetDriveTypeA
lstrlenA
GetModuleHandleA
msvcrt
__getmainargs
_initterm
_exit
_XcptFilter
_adjust_fdiv
__p__fmode
_controlfp
__p__commode
_except_handler3
__p___initenv
__set_app_type
__setusermatherr
advapi32
RegEnumKeyA
RegEnumKeyExA
RegFlushKey
CloseServiceHandle
AddAccessAllowedAce
RegOpenKeyA
GetUserNameA
IsValidSid
AdjustTokenPrivileges
RegQueryValueA
RegCreateKeyExW
SetSecurityDescriptorGroup
OpenServiceW
DeleteService
RegQueryInfoKeyW
RegOpenKeyW
RegQueryValueExW
AllocateAndInitializeSid
CryptHashData
OpenSCManagerA
RegDeleteValueA
RegEnumKeyW
RevertToSelf
DeregisterEventSource
RegDeleteKeyW
SetSecurityDescriptorOwner
RegDeleteKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CryptGenRandom
user32
GetCursorPos
BeginPaint
IsDialogMessageA
GetActiveWindow
GetWindowLongA
RedrawWindow
GetWindowTextA
SystemParametersInfoA
EndDialog
GetForegroundWindow
GetSysColorBrush
IsWindowVisible
GetDC
CharLowerA
WinHelpA
GetMenuStringA
DrawIcon
UpdateWindow
SetWindowTextA
RegisterClipboardFormatA
SetPropA
GetWindowPlacement
SetScrollPos
SetCursor
DrawMenuBar
GetScrollRange
WindowFromPoint
ShowOwnedPopups
SetWindowLongA
GetScrollInfo
OpenClipboard
GetPropA
DestroyCursor
LoadStringA
SetRect
GetTopWindow
GetMessagePos
GetMenu
ShowWindow
EqualRect
RemoveMenu
GetWindowThreadProcessId
PostQuitMessage
IsWindow
OffsetRect
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ