Static task
static1
Behavioral task
behavioral1
Sample
4b0354b5e8076da3164fc277016d6a0ad06cde2eb25d6dc180944f34f10bd628.exe
Resource
win7-20220812-en
General
-
Target
4b0354b5e8076da3164fc277016d6a0ad06cde2eb25d6dc180944f34f10bd628
-
Size
144KB
-
MD5
5c48feffa7dd5429c2eea9c0d872cd10
-
SHA1
2718443f43ef6fc03c41430c1a8a6a7a96b1f39c
-
SHA256
4b0354b5e8076da3164fc277016d6a0ad06cde2eb25d6dc180944f34f10bd628
-
SHA512
e98bf0fcf5063817d4164715ba799a5c279444da5aa21ecf9e08d0ec1596353934a9dbc695d3a8fe992f2b3ec0f5edf1e42ce209b0966ce86f2f32ce67bc8098
-
SSDEEP
3072:uUXxvLY17sTkoQfYDsCOsl0XyafGT7/MXpGc0VV6osQo5StJjRFpW:uUXxv6fmsCOsOFpPJoeU3FFpW
Malware Config
Signatures
Files
-
4b0354b5e8076da3164fc277016d6a0ad06cde2eb25d6dc180944f34f10bd628.exe windows x86
81ec9a35cff2007a29cfd920d5a77414
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
lstrlenW
GetLastError
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
RaiseException
GetCurrentThreadId
SetEvent
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
InterlockedIncrement
EnterCriticalSection
GetModuleFileNameA
InterlockedExchange
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
lstrlenA
GetModuleHandleA
WaitForSingleObject
CreateEventA
CreateThread
CloseHandle
Sleep
LeaveCriticalSection
GetCommandLineA
InterlockedCompareExchange
GetVersionExA
user32
DispatchMessageA
TranslateMessage
GetMessageA
PostThreadMessageA
CharNextA
CharUpperA
UnregisterClassA
advapi32
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
ole32
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoRegisterClassObject
CoRevokeClassObject
CoInitialize
CoUninitialize
oleaut32
LoadRegTypeLi
GetErrorInfo
VariantChangeType
VariantCopy
VariantInit
VariantClear
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
SysStringLen
RegisterTypeLi
VarUI4FromStr
msvcr80
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_decode_pointer
??3@YAXPAX@Z
_resetstkoflw
memcpy_s
__CxxFrameHandler3
??_V@YAXPAX@Z
??_U@YAPAXI@Z
_CxxThrowException
strncpy_s
memset
memcmp
wcsncpy_s
strcpy_s
strcat_s
malloc
free
_recalloc
??2@YAPAXI@Z
_purecall
_wcsicmp
_except_handler4_common
_unlock
_encode_pointer
__dllonexit
_lock
_onexit
_adjust_fdiv
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE