Static task
static1
Behavioral task
behavioral1
Sample
20e222885c5da5c37cf2d162ec9042f38cd7bb50cfc830e1525c6bf10235b1f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20e222885c5da5c37cf2d162ec9042f38cd7bb50cfc830e1525c6bf10235b1f9.exe
Resource
win10v2004-20220812-en
General
-
Target
20e222885c5da5c37cf2d162ec9042f38cd7bb50cfc830e1525c6bf10235b1f9
-
Size
636KB
-
MD5
042e880a2d59412f5b228ccc42ebfc23
-
SHA1
1fdc80106942d1035fe62eff73f9b42de3482f8d
-
SHA256
20e222885c5da5c37cf2d162ec9042f38cd7bb50cfc830e1525c6bf10235b1f9
-
SHA512
ea620aab2617557ed1b792f5c9c292db2a283d8f62c3e80ec4d1b576a3293b7ca84614ba0264ca1f4565e3db5cbc42f5c976375b2e1f3e0e162d5bd7cc31f71c
-
SSDEEP
12288:yRzflN9LswnIzLXQJwU30dA8M/KtRYBfLenUYrwXguuomV:ytflNIPXQJmdA8MC3YVb8V
Malware Config
Signatures
Files
-
20e222885c5da5c37cf2d162ec9042f38cd7bb50cfc830e1525c6bf10235b1f9.exe windows x86
14ad02344740d4404484437ec5e9e03c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetDriveTypeA
FindNextFileA
TerminateProcess
OpenProcess
GetSystemDirectoryA
WideCharToMultiByte
MultiByteToWideChar
SetCurrentDirectoryA
GetFullPathNameA
GetCurrentDirectoryA
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetModuleFileNameA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetEnvironmentVariableA
GetDiskFreeSpaceA
CompareStringA
SetFilePointer
VirtualProtect
InitializeCriticalSection
GetLocaleInfoA
VirtualQuery
InterlockedExchange
SetUnhandledExceptionFilter
LCMapStringW
GetVersion
GetSystemInfo
InterlockedDecrement
InterlockedIncrement
FreeLibrary
LoadLibraryA
CreateMutexA
GetLastError
ReleaseMutex
WaitForSingleObject
CloseHandle
WinExec
CreateProcessA
GetCurrentProcess
WritePrivateProfileStringA
MoveFileExA
GetWindowsDirectoryA
FindClose
SetErrorMode
GetVersionExA
CompareStringW
GetProcAddress
GetShortPathNameA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
HeapReAlloc
SetFileAttributesA
GetFileAttributesA
MoveFileA
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
RaiseException
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapSize
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
SetEnvironmentVariableW
user32
CharPrevA
CharNextA
GetSystemMetrics
SetWindowTextA
LoadIconA
SendMessageA
BringWindowToTop
SendDlgItemMessageA
InvalidateRect
UpdateWindow
EndDialog
SystemParametersInfoA
GetParent
GetWindowRect
SetWindowPos
IsWindow
CreateDialogParamA
GetSysColor
MessageBoxA
ExitWindowsEx
FindWindowA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
KillTimer
SetTimer
PostMessageA
DefWindowProcA
advapi32
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyA
RegDeleteKeyA
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
gdi32
SetBkColor
DeleteObject
CreateSolidBrush
SetTextColor
comctl32
ord17
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 516KB - Virtual size: 921KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 32.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE