Static task
static1
Behavioral task
behavioral1
Sample
4be243dab9078f0b7a1d346b8918a06a10eed11e97bb1acbc3714175dbe023fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4be243dab9078f0b7a1d346b8918a06a10eed11e97bb1acbc3714175dbe023fc.exe
Resource
win10v2004-20220812-en
General
-
Target
4be243dab9078f0b7a1d346b8918a06a10eed11e97bb1acbc3714175dbe023fc
-
Size
184KB
-
MD5
48a3245e0359e82fce04cac1231a2610
-
SHA1
258a988669af1a20534180cbf0679e097ed46621
-
SHA256
4be243dab9078f0b7a1d346b8918a06a10eed11e97bb1acbc3714175dbe023fc
-
SHA512
3fdfcc043394e82831d4f7d4a10a13927df8b14c8d1adc9357a3cbb60eb4bd08d16e83b453776cc69c28de6fcd3701d9918ee8d39029900f9f902c700e5db7b4
-
SSDEEP
1536:zfu2TvMe+V0t87mlQtojG0MlYG/zeKe9f28adl2x/3+4H989/DJttIBX290Nupo:S2FQwMlL82SG4aVttIQa3
Malware Config
Signatures
Files
-
4be243dab9078f0b7a1d346b8918a06a10eed11e97bb1acbc3714175dbe023fc.exe windows x86
142752899f16d093f7de9cf65d9181ed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
FindResourceExA
CompareStringA
lstrlenW
CompareStringW
lstrlenA
LoadResource
SetEnvironmentVariableA
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LockResource
SizeofResource
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
ReadFile
GetLocaleInfoW
GetTimeZoneInformation
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
VirtualAlloc
GetProcAddress
GetModuleHandleA
RtlUnwind
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
LCMapStringA
LCMapStringW
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetFullPathNameA
GetCurrentDirectoryA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
user32
MessageBoxExA
UnregisterClassA
advapi32
ReportEventA
DeregisterEventSource
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegisterEventSourceA
shell32
ShellExecuteA
oleaut32
SysAllocStringLen
SysFreeString
SysStringLen
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE