Static task
static1
Behavioral task
behavioral1
Sample
280c1406d4e925c17abeeaf5e185d6df0cb2761fdfabd8c4e596cdebbf98a84e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
280c1406d4e925c17abeeaf5e185d6df0cb2761fdfabd8c4e596cdebbf98a84e.exe
Resource
win10v2004-20220812-en
General
-
Target
280c1406d4e925c17abeeaf5e185d6df0cb2761fdfabd8c4e596cdebbf98a84e
-
Size
190KB
-
MD5
6104866e02a24c946d9522d32a41f500
-
SHA1
7e84a351818ddcd7788ff0032609864d73d2b295
-
SHA256
280c1406d4e925c17abeeaf5e185d6df0cb2761fdfabd8c4e596cdebbf98a84e
-
SHA512
3a286a88e72566631ab1092520ea2c1aa84a71ca9fa1402d53a543bd0f4454d4efbfd4adb9243399332de4f8fad9786d38e531b806462b1dd4815543b9431a9d
-
SSDEEP
3072:1bZ32Lx6puYCkZxTSiLzVdiPfW+lazAANqle01Dvf7/Medf9uSDADeak7dJHB/AJ:ZJW0oaxVdiPfdazIBdf739ASsQLH5AJ
Malware Config
Signatures
Files
-
280c1406d4e925c17abeeaf5e185d6df0cb2761fdfabd8c4e596cdebbf98a84e.exe windows x86
0de33aee7bb0c66007294e24ec2b43a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocString
VariantClear
VariantCopy
SysStringByteLen
SysFreeString
user32
CharUpperW
CharPrevA
CharUpperA
CharNextA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
fprintf
memset
wcslen
wcsncmp
memcpy
fputc
fputs
fflush
fgetc
fclose
_iob
free
malloc
memmove
strlen
memcmp
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
GetProcessTimes
VirtualAlloc
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
MapViewOfFile
GetTickCount
UnmapViewOfFile
OpenEventA
GetStdHandle
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
SearchPathW
SearchPathA
GetCurrentDirectoryW
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExA
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
SetCurrentDirectoryW
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
MoveFileA
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
OpenFileMappingA
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ