Static task
static1
Behavioral task
behavioral1
Sample
5d603e305e698bd267a28151289c26b3e5bf9ef86006b3e64cb10db047760a9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d603e305e698bd267a28151289c26b3e5bf9ef86006b3e64cb10db047760a9f.exe
Resource
win10v2004-20220901-en
General
-
Target
5d603e305e698bd267a28151289c26b3e5bf9ef86006b3e64cb10db047760a9f
-
Size
387KB
-
MD5
65764349dbc2d913c811df5adf66f090
-
SHA1
c6a0b018b325bd1c7db72456d7d85238ac02c2dc
-
SHA256
5d603e305e698bd267a28151289c26b3e5bf9ef86006b3e64cb10db047760a9f
-
SHA512
93d4022356b670f6ce88cc0bc47fd611610844cae36db43d33d093d6bc7e9310c689e191453422dda0302badf3701eab8c35fb9232e43573343b4e1ec3e887fb
-
SSDEEP
6144:Pb41nDY6RZ+Pl9Mx0BeY6LCMXRdveOqvQ2w9Z5xntrGtccvsBfDv+LmOQico:P8dZ6Mx0UYRMXDveDQ2+tckBbmLmOKo
Malware Config
Signatures
Files
-
5d603e305e698bd267a28151289c26b3e5bf9ef86006b3e64cb10db047760a9f.exe windows x86
5e01feb0c8712b4079282e56efc8078d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
LoadLibraryExA
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
lstrlenA
CreateFileA
GetModuleFileNameA
ntdll
RtlLengthSid
RtlInitUnicodeString
RtlFreeHeap
RtlAllocateHeap
advapi32
RegOpenKeyExA
LsaClose
RegSetValueExA
RegQueryValueExA
RegCloseKey
LsaOpenPolicy
ulib
?GetLexeme@ARGUMENT@@QAEPAVWSTRING@@XZ
??0DSTRING@@QAE@XZ
??0PATH@@QAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??0ARRAY@@QAE@XZ
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??1PROGRAM@@UAE@XZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
?Usage@PROGRAM@@UBEXXZ
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ