Static task
static1
Behavioral task
behavioral1
Sample
f881f3bbd868559c6b338be7f843dd7c3927f6c4b49afab0da2f39659a9e7355.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f881f3bbd868559c6b338be7f843dd7c3927f6c4b49afab0da2f39659a9e7355.exe
Resource
win10v2004-20220812-en
General
-
Target
f881f3bbd868559c6b338be7f843dd7c3927f6c4b49afab0da2f39659a9e7355
-
Size
82KB
-
MD5
597961bdce26723cbb8a5eccb8a60a80
-
SHA1
e1f1382df7f4ca07091d21629d12e88865ae4ab2
-
SHA256
f881f3bbd868559c6b338be7f843dd7c3927f6c4b49afab0da2f39659a9e7355
-
SHA512
5b0b11ec408d7c451ae52b9f1b418138df91636583c6e3aca4a8883d784f3070f88372239ebbe2e087da4a777446857dbc0805d3adfe625eb8bcb6c073ae2c41
-
SSDEEP
1536:3gSdy5/tRMAAYOmOnNN6AFS5w5+q1oi2gAQn/jDb9czGCq2iW7z:3nq/tedYZONN6CSwkdgtkGCH
Malware Config
Signatures
Files
-
f881f3bbd868559c6b338be7f843dd7c3927f6c4b49afab0da2f39659a9e7355.exe windows x86
623dfa23e84c8a9d001b2f9ac972643d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
GetTempPathA
Sleep
GetLogicalDrives
GetDriveTypeA
WaitForSingleObject
FindClose
FindFirstFileA
GetCurrentProcessId
CreateFileA
CreateProcessA
GetExitCodeProcess
GetLocaleInfoW
GetLocaleInfoA
LCMapStringW
LCMapStringA
LoadLibraryA
GetProcAddress
ReadFile
SetEndOfFile
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetLastError
DeleteFileA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CloseHandle
GetFileAttributesA
GetFileType
FlushFileBuffers
HeapDestroy
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
IsBadWritePtr
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetStringTypeA
GetStringTypeW
SetStdHandle
user32
LoadCursorA
LoadIconA
RegisterClassA
CreateWindowExA
DestroyWindow
DispatchMessageA
GetMessageA
PostMessageA
IsWindow
CreateDialogParamA
ShowWindow
PeekMessageA
GetFocus
DefWindowProcA
BeginPaint
EndPaint
PostQuitMessage
MessageBoxA
gdi32
GetStockObject
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�;#�u? Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE