Static task
static1
Behavioral task
behavioral1
Sample
254f32a68556be75d27ca5ec4c5ff9f8a62c0abe90b6f1a6328e0fd66d846716.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
254f32a68556be75d27ca5ec4c5ff9f8a62c0abe90b6f1a6328e0fd66d846716.exe
Resource
win10v2004-20220812-en
General
-
Target
254f32a68556be75d27ca5ec4c5ff9f8a62c0abe90b6f1a6328e0fd66d846716
-
Size
224KB
-
MD5
090507fc96b44772a7921ae7e4df62c0
-
SHA1
8e6310b78e3de0054d4692542cfe2962aec0279f
-
SHA256
254f32a68556be75d27ca5ec4c5ff9f8a62c0abe90b6f1a6328e0fd66d846716
-
SHA512
1f5db2973bfbd29c7821909e08962d73804430ff9b09096213bd00908c80985b5e13bd542d5a6b5f831bd00fb58afdfad0cfd51f30821eb9b69371f82ce73d40
-
SSDEEP
3072:rAsFhneWpZuWkQdO6swLtuGlPWfgI/4P56XlzV3fLJhRKHcJ4y6u9oSvkUy1Q:8sThKxQqwLtuGJW4QNBLPWcDxvsZQ
Malware Config
Signatures
Files
-
254f32a68556be75d27ca5ec4c5ff9f8a62c0abe90b6f1a6328e0fd66d846716.exe windows x86
0077c043cae528ddcaa3e096ed671e0e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
SetEndOfFile
DeleteFileW
ReadFile
GetFileSizeEx
LocalFree
CreateDirectoryW
GetEnvironmentVariableW
ReleaseMutex
WaitForSingleObject
GetTimeFormatW
GetLocalTime
OutputDebugStringW
MapViewOfFile
CreateMutexW
GetFileAttributesW
GetModuleFileNameW
GetCommandLineW
CloseHandle
GetSystemDirectoryW
GetCurrentProcess
GetVersionExW
UnmapViewOfFile
CreateFileMappingW
MapViewOfFileEx
CreateFileW
GetLastError
Sleep
GetModuleHandleW
LocalAlloc
GetProcAddress
GetProcessHeap
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
HeapSize
LoadLibraryA
HeapAlloc
HeapFree
RtlUnwind
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
ExitProcess
GetStdHandle
GetModuleFileNameA
RaiseException
GetModuleHandleA
LCMapStringW
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
advapi32
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetNamedSecurityInfoW
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
AllocateAndInitializeSid
shell32
SHGetKnownFolderPath
SHGetFolderPathW
shlwapi
PathSkipRootW
PathRemoveFileSpecW
PathStripPathW
PathStripToRootW
PathIsRelativeW
PathAppendW
PathIsNetworkPathW
ole32
CoTaskMemFree
Sections
.text Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE