Static task
static1
Behavioral task
behavioral1
Sample
45d43fada7894589d5a189366863c0311e70c35faa0f3c0347cc150e7292eef3.exe
Resource
win7-20220812-en
General
-
Target
45d43fada7894589d5a189366863c0311e70c35faa0f3c0347cc150e7292eef3
-
Size
218KB
-
MD5
4ca4a3567c0dc22f2587164526f2e3e3
-
SHA1
712f7dbdcfa0731cca175d54ce346b6a871c9a90
-
SHA256
45d43fada7894589d5a189366863c0311e70c35faa0f3c0347cc150e7292eef3
-
SHA512
7856ec9018ae1b2d4691097be83c130d6a461bd758599fadeeec485645e25a395e1984cadd14b6ebf0e07381d724c48401fe41994fd6126e46eef880ee60baa0
-
SSDEEP
6144:BV+eO22Pn2xWWnDsLElUxM+Je3lLsvUEdA:l2O/IeUd+nuA
Malware Config
Signatures
Files
-
45d43fada7894589d5a189366863c0311e70c35faa0f3c0347cc150e7292eef3.exe windows x86
273b774a75d0c550434d1822b745c8f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
ResumeThread
TerminateProcess
lstrcpyA
CreateProcessA
GetSystemInfo
GetVersionExA
GetCurrentProcessId
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
GetModuleHandleA
WriteFile
HeapFree
HeapAlloc
GetProcessHeap
CreateThread
LocalAlloc
OpenFileMappingA
GetCommandLineA
GetProcAddress
FreeLibrary
LoadLibraryA
OpenEventA
OutputDebugStringA
Sleep
lstrcatA
GlobalMemoryStatus
GetComputerNameA
GetCurrentProcess
GetCurrentThread
GetDiskFreeSpaceA
GetVolumeInformationA
GetDriveTypeA
CreateEventA
SetEvent
CreateMutexA
GetLastError
WaitForSingleObject
CloseHandle
GetTickCount
lstrcmpiA
lstrcmpA
FormatMessageA
LocalFree
lstrcpynA
lstrlenA
CompareStringA
CompareStringW
SetEnvironmentVariableA
UnmapViewOfFile
MapViewOfFile
FindFirstFileA
GetFullPathNameA
HeapDestroy
GetEnvironmentVariableA
GetTimeZoneInformation
FileTimeToLocalFileTime
HeapCreate
CreateDirectoryA
SetEndOfFile
FindClose
FlushFileBuffers
SetStdHandle
SetConsoleCtrlHandler
GetStringTypeA
LCMapStringW
GetStringTypeW
MultiByteToWideChar
IsBadCodePtr
LCMapStringA
SetUnhandledExceptionFilter
GetFileType
IsBadReadPtr
SetHandleCount
GetEnvironmentStringsW
GetStdHandle
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
SetCurrentDirectoryA
GetCurrentDirectoryA
RtlUnwind
GetFileAttributesA
ExitProcess
GetLocalTime
GetStartupInfoA
GetVersion
FileTimeToSystemTime
GetCPInfo
IsBadWritePtr
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetACP
GetOEMCP
HeapSize
user32
LoadStringA
SendMessageA
LoadCursorA
wsprintfA
RegisterClassA
GetParent
LoadIconA
MessageBoxA
CreateWindowExA
SetWindowPos
ShowWindow
BeginPaint
DefWindowProcA
EndPaint
IsWindow
PostQuitMessage
IsDialogMessageA
DispatchMessageA
GetMessageA
GetWindowPlacement
GetSystemMetrics
wvsprintfA
SystemParametersInfoA
GetWindowRect
TranslateMessage
GetClientRect
gdi32
GetStockObject
advapi32
RegEnumValueA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegCloseKey
GetTokenInformation
OpenProcessToken
OpenThreadToken
LookupAccountSidA
FreeSid
EqualSid
AllocateAndInitializeSid
winmm
timeGetTime
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE