Static task
static1
Behavioral task
behavioral1
Sample
554a4e781e91dfb23cb367200bc6c14ce1babde922cb6751ed4e3d4f29f09b05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
554a4e781e91dfb23cb367200bc6c14ce1babde922cb6751ed4e3d4f29f09b05.exe
Resource
win10v2004-20220812-en
General
-
Target
554a4e781e91dfb23cb367200bc6c14ce1babde922cb6751ed4e3d4f29f09b05
-
Size
292KB
-
MD5
0964f6db592f215f6a68191fffd0f290
-
SHA1
c10c6c6a635cc0ce053228c66577a3cb225b3ad2
-
SHA256
554a4e781e91dfb23cb367200bc6c14ce1babde922cb6751ed4e3d4f29f09b05
-
SHA512
1568dc95fecb9f7159bf11aa072c833cf3dd1e05fda540bd5688427a5199c2e0d3e7c8955892fc7ece3150dfc4871aa8d8944857e5206ce6a12ca1f3337a4647
-
SSDEEP
6144:/77WeMpMzb7O3qaKAmqjLRU48Cg3DmzhIaAYtPNWE6y4Nud:/nMpYbQmqjdU42TUh5NtlWVNN8
Malware Config
Signatures
Files
-
554a4e781e91dfb23cb367200bc6c14ce1babde922cb6751ed4e3d4f29f09b05.exe windows x86
1245cd39ef8b792ebf427fc7b6387960
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushInstructionCache
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
GetModuleHandleW
GetModuleFileNameW
GetLastError
InitializeCriticalSection
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
lstrcmpiW
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
InterlockedExchange
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
lstrcpynW
GetLocaleInfoW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
Sleep
HeapSize
HeapReAlloc
FatalAppExitA
HeapDestroy
HeapCreate
IsDebuggerPresent
TerminateProcess
GetCurrentThread
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
WriteFile
SetUnhandledExceptionFilter
lstrlenA
lstrcpynA
GetCurrentThreadId
GetVersionExW
RaiseException
lstrlenW
SetLastError
OutputDebugStringW
GetLocaleInfoA
UnhandledExceptionFilter
GetStartupInfoW
RtlUnwind
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
HeapAlloc
GetProcessHeap
InterlockedCompareExchange
HeapFree
user32
GetActiveWindow
TranslateAcceleratorW
SetMenuItemInfoW
SetMenuDefaultItem
GetMenuItemInfoW
CharNextW
GetWindow
MonitorFromWindow
GetParent
ShowWindow
MapWindowPoints
GetClientRect
PostMessageW
SetWindowLongW
GetMessageW
TranslateMessage
DispatchMessageW
wvsprintfW
CallWindowProcW
MonitorFromPoint
GetMonitorInfoW
RemoveMenu
GetMenuItemCount
AppendMenuW
TrackPopupMenuEx
DestroyMenu
CreatePopupMenu
GetWindowLongW
InvalidateRect
GetWindowRect
PeekMessageW
PtInRect
IsWindow
MessageBeep
SetWindowPos
CreateWindowExW
GetClassInfoExW
LoadCursorW
LoadImageW
RegisterClassExW
DefWindowProcW
LoadStringA
PostQuitMessage
SetFocus
SendMessageW
LoadStringW
LoadMenuW
LoadAcceleratorsW
EndDialog
DialogBoxParamW
UnregisterClassA
advapi32
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
shell32
CommandLineToArgvW
ole32
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
oleaut32
VarUI4FromStr
SysFreeString
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE