Static task
static1
Behavioral task
behavioral1
Sample
45f526ad9c4353f6d7ffd31f8d74cd61e7c69e2e30f812051c756810536726ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45f526ad9c4353f6d7ffd31f8d74cd61e7c69e2e30f812051c756810536726ff.exe
Resource
win10v2004-20220812-en
General
-
Target
45f526ad9c4353f6d7ffd31f8d74cd61e7c69e2e30f812051c756810536726ff
-
Size
163KB
-
MD5
6e16c712bdb55338efc7218cb49a7db0
-
SHA1
a57838056dfdb66b52b360e252667385416b5bd1
-
SHA256
45f526ad9c4353f6d7ffd31f8d74cd61e7c69e2e30f812051c756810536726ff
-
SHA512
10cdd400e2b5ba5473c69ddcd165f185a7b8973c60c15233acee6db4a7d7766418ab79ca0594e80947e472e3ee4e828e802b9a9f0ff3bdee1b544117bd1212f3
-
SSDEEP
3072:igugargYT3kNanAYgvCZQikhW0aIM56zX5B5AhR+nHT1RkKKbvjU5yP:igyr9oNaAYg/NaIMK6wHBVKbvQw
Malware Config
Signatures
Files
-
45f526ad9c4353f6d7ffd31f8d74cd61e7c69e2e30f812051c756810536726ff.exe windows x86
42115272bfb7769f03999310f17519aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
EqualSid
QueryServiceStatus
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
SetSecurityDescriptorDacl
StartServiceA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
CreateProcessA
DisableThreadLibraryCalls
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
FindFirstFileA
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetConsoleCP
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentVariableA
GetFileTime
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetPrivateProfileSectionNamesA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GlobalAlloc
GlobalLock
GlobalReAlloc
HeapAlloc
HeapCreate
HeapDestroy
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsValidCodePage
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LocalFree
Module32First
MoveFileExA
QueryPerformanceCounter
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
ResetEvent
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetHandleCount
SetLastError
SetUnhandledExceptionFilter
Sleep
SuspendThread
SystemTimeToFileTime
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcmpiA
lstrcpyA
user32
ClientToScreen
CreatePopupMenu
CreateWindowExA
DestroyMenu
DispatchMessageA
GetCapture
GetClientRect
GetMenuItemCount
GetProcessWindowStation
GetSubMenu
IsIconic
IsWindowVisible
KillTimer
LoadCursorA
LoadStringA
MessageBoxA
RegisterClassExA
ReleaseDC
SetCapture
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetRect
SetWindowPos
UnhookWindowsHookEx
UpdateWindow
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 111KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ