Static task
static1
Behavioral task
behavioral1
Sample
0258dbaf87a937940844eb8ea845e87c25e777a131404b0325f7556000a38689.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0258dbaf87a937940844eb8ea845e87c25e777a131404b0325f7556000a38689.exe
Resource
win10v2004-20220812-en
General
-
Target
0258dbaf87a937940844eb8ea845e87c25e777a131404b0325f7556000a38689
-
Size
328KB
-
MD5
6890538e83e0805a6cc7b533efa07a70
-
SHA1
4bfd454dc712999f49a38111116b97211f7ad0f6
-
SHA256
0258dbaf87a937940844eb8ea845e87c25e777a131404b0325f7556000a38689
-
SHA512
c8d4fe3331313d99c1bc6bc363c1d42c494764a8e8a2a835511d6b4153f7730e75a8a70a5319c5eef03bca7e706a25593af4bf11d948be3119d7067d01bbe80f
-
SSDEEP
6144:T12yNSGVQwZ7LJI/NLJI/od4+CWeEmqDDNsN6VmAHu5Qr:TQyNSGqS7LJI/NLJI/KGPED3NZVcW
Malware Config
Signatures
Files
-
0258dbaf87a937940844eb8ea845e87c25e777a131404b0325f7556000a38689.exe windows x86
7d2bad4a7aa5a3924d54e9665cc5466b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
kernel32
GetProcAddress
LocalFree
FormatMessageA
GetLastError
LoadLibraryA
GetModuleFileNameA
GetCurrentDirectoryA
GetModuleHandleA
ReadFile
SetEndOfFile
HeapSize
IsValidCodePage
MultiByteToWideChar
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetStartupInfoA
GetCommandLineA
GetVersionExA
WideCharToMultiByte
SetEnvironmentVariableW
ExitProcess
TerminateProcess
GetCurrentProcess
HeapFree
HeapAlloc
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
GetFullPathNameA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
CloseHandle
TlsAlloc
SetLastError
GetCurrentThreadId
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
RtlUnwind
InterlockedExchange
SetFilePointer
CompareStringA
GetCPInfo
CompareStringW
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetTimeZoneInformation
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetFileAttributesA
SetStdHandle
FlushFileBuffers
CreateFileA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
user32
PostMessageA
MessageBoxA
FindWindowA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE