Static task
static1
Behavioral task
behavioral1
Sample
192c96cc628b897405f499e5f6376957020a563effd9a2ef1719bf41368bee24.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
192c96cc628b897405f499e5f6376957020a563effd9a2ef1719bf41368bee24.exe
Resource
win10v2004-20220901-en
General
-
Target
192c96cc628b897405f499e5f6376957020a563effd9a2ef1719bf41368bee24
-
Size
277KB
-
MD5
631a74c5cf615767c70c989ef6cf629e
-
SHA1
353cbc79752cc78a6000a650b1f86a7d40a2302f
-
SHA256
192c96cc628b897405f499e5f6376957020a563effd9a2ef1719bf41368bee24
-
SHA512
a7ea599dd535ea7f9b2b397942e54ac5fb404ab8c586e597640b5a722a42ba18e3aa3e7d968ac2529cebf8d3b8a1dbf956ac4902b4255c08e30db716b65c8258
-
SSDEEP
3072:+JSiS/dFBcQrmt0T5nG0gZfYKgZfYNpW+WZIK4syLlvEzaKCNsvx7gG+nt:+JJS/zBfmt0T5GHZwpZwNHWWFtL9OyGW
Malware Config
Signatures
Files
-
192c96cc628b897405f499e5f6376957020a563effd9a2ef1719bf41368bee24.exe windows x86
357e24ec8637acff2bc9b2ffa0964b9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pncrt
_controlfp
??1type_info@@UAE@XZ
fclose
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_XcptFilter
_purecall
_acmdln
exit
__dllonexit
_exit
_onexit
_CxxThrowException
__CxxFrameHandler
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
wcstok
_wcsdup
wcscat
wcscpy
time
vsprintf
gmtime
asctime
_ismbcspace
malloc
realloc
free
_vsnprintf
_stricmp
_mbctype
memmove
strstr
??2@YAPAXI@Z
_putenv
fprintf
fseek
strncpy
_control87
strchr
sprintf
printf
atoi
strrchr
getenv
strtok
strtoul
??3@YAXPAX@Z
wcslen
fopen
ole32
OleInitialize
OleUninitialize
version
GetFileVersionInfoA
VerQueryValueA
kernel32
CreateDirectoryA
GetCommandLineW
InterlockedExchange
UnmapViewOfFile
FindFirstFileW
Sleep
OpenProcess
IsBadWritePtr
GlobalMemoryStatus
GetThreadContext
WriteFile
VirtualQuery
SetFilePointer
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
CreateThread
SetCurrentDirectoryA
SetUnhandledExceptionFilter
TerminateThread
GetVersion
GetSystemInfo
WideCharToMultiByte
FindClose
CreateFileA
GetVersionExA
GetProcAddress
GetStartupInfoA
GetModuleHandleA
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
WaitForSingleObject
ReleaseMutex
CloseHandle
GetLastError
CreateMutexA
OpenMutexA
FreeLibrary
MoveFileA
MapViewOfFile
CreateFileMappingA
GetCurrentProcessId
SetErrorMode
DeleteFileA
GetEnvironmentVariableA
InterlockedIncrement
InterlockedDecrement
GetTickCount
QueryPerformanceCounter
QueryPerformanceFrequency
LoadLibraryA
user32
ReleaseDC
CreateWindowExA
RegisterWindowMessageA
DestroyWindow
UnregisterClassA
GetDC
CharPrevA
wsprintfA
CharNextA
GetSystemMetrics
EnumWindows
SendMessageA
GetPropA
DefWindowProcA
SetMessageQueue
PostThreadMessageA
GetClassInfoExA
RegisterClassExA
advapi32
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegOpenKeyA
RegOpenKeyExA
gdi32
GetDeviceCaps
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE