Static task
static1
Behavioral task
behavioral1
Sample
928f422c9a963d6e713e581f74d6e744d3a4f558900f3c4ee2a7c8491fd19514.exe
Resource
win7-20220901-en
General
-
Target
928f422c9a963d6e713e581f74d6e744d3a4f558900f3c4ee2a7c8491fd19514
-
Size
287KB
-
MD5
2b159c04e7f8d5f7d389a2f5d8a4f9b0
-
SHA1
3dccc3ac70a5c942869121e5ba5b7b7192f4548e
-
SHA256
928f422c9a963d6e713e581f74d6e744d3a4f558900f3c4ee2a7c8491fd19514
-
SHA512
3136f0864ee183a469dce1271e5b033422be060d3f3e155fcadffe72859cea36fa3708ab3b8d3e7a53f0ecfbe0c3c353f69bbf5b1364aae693fe571347ed1627
-
SSDEEP
3072:jMVagCjLr3aQpcKyp9FudU3K3utIJHMH0lQuBeE/8fbPLTN9hYzq54:4ViT3aQp4yjDW0T9/ALLTLhYzqa
Malware Config
Signatures
Files
-
928f422c9a963d6e713e581f74d6e744d3a4f558900f3c4ee2a7c8491fd19514.exe windows x86
32cb408fcb9a0248c670af57723567fa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryW
GetModuleFileNameA
SetEvent
LoadResource
VirtualAllocEx
CreateProcessW
Process32NextW
lstrlenA
GetModuleHandleA
Sleep
MultiByteToWideChar
LockResource
CreateRemoteThread
CreateToolhelp32Snapshot
WriteProcessMemory
OpenProcess
GetModuleFileNameW
LoadLibraryA
CloseHandle
ReadFile
SetFilePointer
ReleaseMutex
SetEndOfFile
SetFileAttributesW
WriteFile
GetFileSize
GetFileAttributesW
CreateMutexW
ResumeThread
ExitProcess
FreeLibrary
ReadProcessMemory
TerminateProcess
SetLastError
VirtualProtectEx
GetCurrentThreadId
VirtualFree
VirtualAlloc
FindClose
FindFirstFileW
FindResourceW
GetCurrentProcessId
WideCharToMultiByte
GetModuleHandleW
FindResourceExW
GetCurrentProcess
OpenEventW
Process32FirstW
WaitForSingleObject
GetCommandLineW
CreateFileW
GetLastError
SizeofResource
VirtualQueryEx
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetVersionExA
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetACP
GetLocaleInfoA
GetThreadLocale
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
HeapCreate
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetHandleCount
GetStdHandle
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
user32
wsprintfW
UnregisterClassA
advapi32
SetSecurityDescriptorDacl
RegOpenKeyW
InitializeSecurityDescriptor
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyA
RegOpenKeyExW
RegSetValueExW
RegQueryValueExA
RegCloseKey
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
shell32
SHGetSpecialFolderPathW
SHCreateDirectoryExW
CommandLineToArgvW
shlwapi
PathRemoveFileSpecA
PathIsUNCW
PathRemoveFileSpecW
PathAppendW
StrStrIA
PathFindFileNameW
SHEnumKeyExW
PathFileExistsW
psapi
GetModuleFileNameExW
EnumProcesses
GetProcessImageFileNameW
Sections
.text Size: 156KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE