Static task
static1
Behavioral task
behavioral1
Sample
b66284168a5d31116893df518e080d904e6a5191c5c73a81c8c5976676cc1964.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b66284168a5d31116893df518e080d904e6a5191c5c73a81c8c5976676cc1964.exe
Resource
win10v2004-20220901-en
General
-
Target
b66284168a5d31116893df518e080d904e6a5191c5c73a81c8c5976676cc1964
-
Size
28KB
-
MD5
0027649874b28c337efa3e155881b3d0
-
SHA1
ccf817ab404deb70184a5cc18d873e7a0966693c
-
SHA256
b66284168a5d31116893df518e080d904e6a5191c5c73a81c8c5976676cc1964
-
SHA512
a34a54604130c275817d74ce31034f279614da777dc49c3f17049089f3af97bb4816b8cc0412585f0c5c06d254c1bd102c892a42ce11afe5989bc06826413051
-
SSDEEP
384:C+x32bRI4puw9/m7BML4Qm6TA1NuCip891B140o3R57mwHgZKnjYyxabpDI4FtO:CqmRI4Du7BEO71gC+wrwiaYyOpPFs
Malware Config
Signatures
Files
-
b66284168a5d31116893df518e080d904e6a5191c5c73a81c8c5976676cc1964.exe windows x86
07072aec583f599e0eaf08045b38e192
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetCurrentDirectoryA
CreateFileA
lstrcatA
lstrcpyA
SetThreadPriority
GetCurrentThread
GetCurrentProcess
Sleep
FindFirstFileA
GetModuleFileNameA
InterlockedDecrement
WideCharToMultiByte
lstrlenW
lstrlenA
WritePrivateProfileStringA
OpenMutexA
GetPrivateProfileIntA
CreateProcessW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
CopyFileA
CreateMutexW
ReadFile
GetLocalTime
SetFileAttributesA
WriteFile
CreateThread
GetWindowsDirectoryA
LoadLibraryA
CreateMutexA
MultiByteToWideChar
CreateToolhelp32Snapshot
LocalFree
GetLastError
Process32First
Process32Next
OpenProcess
GetPrivateProfileStringA
CloseHandle
user32
FindWindowExA
SendMessageA
GetWindowThreadProcessId
wsprintfA
IsWindow
wsprintfW
CharUpperA
FindWindowA
advapi32
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetNamedSecurityInfoA
shell32
SHChangeNotify
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
OleRun
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysAllocStringLen
SysStringByteLen
VariantInit
VariantClear
SysFreeString
VariantCopy
SysStringLen
GetErrorInfo
shlwapi
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
msvcrt
_controlfp
rename
_CxxThrowException
??1type_info@@UAE@XZ
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
sprintf
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_EH_prolog
__CxxFrameHandler
memcpy
memset
strchr
__getmainargs
__p___initenv
exit
_XcptFilter
strlen
_strupr
_wcsupr
wcsstr
_exit
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ