Static task
static1
Behavioral task
behavioral1
Sample
02d4b12b0fd4dfa352cf501462bed41b24042f45e5bf3d242426285cc32a04df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02d4b12b0fd4dfa352cf501462bed41b24042f45e5bf3d242426285cc32a04df.exe
Resource
win10v2004-20220812-en
General
-
Target
02d4b12b0fd4dfa352cf501462bed41b24042f45e5bf3d242426285cc32a04df
-
Size
594KB
-
MD5
1a10748e998bfcca0cf09e07e694ca41
-
SHA1
2ae12f2aa90ce0064b52ee84c9f6de6fe84c1533
-
SHA256
02d4b12b0fd4dfa352cf501462bed41b24042f45e5bf3d242426285cc32a04df
-
SHA512
1088cc08cbe2d6a5cec35fdd42320774e3aae0ca754b0991a19de1964bc6bd6fd175d41181da311c3744665ab094f1e3b2fa407558e64fb5bff963ae34010eb5
-
SSDEEP
12288:rQFuPuOL3Wy87P99BRA+V0FmqrDmVQ05cR3MrXZskhPxJ1:rQEPuOLGy8x/R9V0FmoDj05E3QhF
Malware Config
Signatures
Files
-
02d4b12b0fd4dfa352cf501462bed41b24042f45e5bf3d242426285cc32a04df.exe windows x86
760b3a2d9b1e8f2f831be472bcf42479
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetEnvironmentStrings
SetWaitableTimer
GetCurrentProcessId
CompareStringA
GetStdHandle
VirtualQuery
GetSystemTimeAdjustment
GetSystemTime
GetTimeZoneInformation
SetStdHandle
SetEnvironmentVariableA
SetFilePointer
GetCPInfo
OpenMutexA
TerminateProcess
InterlockedExchange
GetSystemTimeAsFileTime
VirtualFree
GetVersion
GetEnvironmentStringsW
GetNamedPipeHandleStateW
IsBadWritePtr
CreateRemoteThread
TlsGetValue
HeapCreate
HeapAlloc
GetCurrentThread
GetModuleHandleA
IsValidLocale
UnhandledExceptionFilter
GetLogicalDrives
TlsSetValue
DeleteCriticalSection
QueryPerformanceCounter
GetOEMCP
ExitProcess
LeaveCriticalSection
EnterCriticalSection
HeapFree
GetModuleFileNameA
WaitForSingleObjectEx
GetACP
OpenProcess
GetFileType
LoadLibraryA
ReadFile
GetCurrentThreadId
InterlockedDecrement
CommConfigDialogA
LCMapStringA
InterlockedIncrement
HeapReAlloc
TlsFree
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
CreateMailslotW
GetProcessAffinityMask
RaiseException
UnlockFile
GetStartupInfoA
VirtualAlloc
GetLocalTime
FreeEnvironmentStringsA
CreateMutexA
HeapDestroy
GetCommandLineA
CompareStringW
EnumSystemLocalesA
CloseHandle
GetLastError
SetLastError
SetHandleCount
GetWindowsDirectoryA
LCMapStringW
WriteFile
GetCurrentProcess
InitializeCriticalSection
GetVolumeInformationA
RtlUnwind
MultiByteToWideChar
TlsAlloc
FlushFileBuffers
RtlFillMemory
FreeEnvironmentStringsW
GetDiskFreeSpaceW
GetProcAddress
comdlg32
GetSaveFileNameW
ReplaceTextW
FindTextA
gdi32
PolyPolyline
MoveToEx
InvertRgn
FixBrushOrgEx
CreateRectRgnIndirect
GetEnhMetaFilePaletteEntries
SetWinMetaFileBits
comctl32
InitCommonControlsEx
ImageList_GetDragImage
ImageList_SetImageCount
ImageList_Remove
ImageList_DragLeave
user32
ChangeMenuA
DefMDIChildProcW
RegisterClassExA
CallMsgFilter
EnumDesktopsW
DestroyWindow
RegisterClassA
SendNotifyMessageW
ShowWindow
GetClipboardOwner
GetDC
UnregisterClassW
DefWindowProcW
SetClipboardData
MessageBoxW
DdeQueryStringW
CreateWindowExA
OpenWindowStationW
OpenDesktopW
advapi32
LookupPrivilegeDisplayNameA
CryptContextAddRef
LookupPrivilegeNameA
RegQueryValueA
RegOpenKeyExW
LookupAccountSidW
RegQueryMultipleValuesW
CryptDecrypt
LookupPrivilegeNameW
CryptGenRandom
RegQueryValueExW
StartServiceW
LookupPrivilegeValueA
RegEnumValueW
RegSetValueW
AbortSystemShutdownA
shell32
SheChangeDirExW
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 237KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ