Static task
static1
Behavioral task
behavioral1
Sample
98d2e12120d5086201454825ee0db835a5aea8c85106d8c5f0547086c5259214.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98d2e12120d5086201454825ee0db835a5aea8c85106d8c5f0547086c5259214.exe
Resource
win10v2004-20220812-en
General
-
Target
98d2e12120d5086201454825ee0db835a5aea8c85106d8c5f0547086c5259214
-
Size
154KB
-
MD5
2a109fb9c08cc5d18ee186c78401a6a0
-
SHA1
38ac2d839016066f92ef382edcabe87162d348dc
-
SHA256
98d2e12120d5086201454825ee0db835a5aea8c85106d8c5f0547086c5259214
-
SHA512
0697296364f1d1b87e9a9e7200386734598ca94b10f752da493ff1640fc57b7f6fb4e99ddeb094fbc1d20131c1f42ff2900326247594f5c02ec94574e69fe948
-
SSDEEP
3072:DTiA54FU1S/Y069O4teVKDad7uGCOuyodRw:iA5eU1L39+dtMOuyF
Malware Config
Signatures
Files
-
98d2e12120d5086201454825ee0db835a5aea8c85106d8c5f0547086c5259214.exe windows x86
a0cae1f0a5b4922c42a804ad61e1c13e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
timeGetTime
kernel32
GetCurrentDirectoryA
GetWindowsDirectoryA
GetLongPathNameA
GetModuleFileNameA
GetVolumeInformationA
GetDriveTypeA
MultiByteToWideChar
GetVersionExA
CopyFileA
Sleep
GetTempPathA
_lclose
_lwrite
_lread
_llseek
OpenFile
WritePrivateProfileStringA
GlobalFree
GetPrivateProfileStringA
CreateFileA
lstrcpyA
GlobalAlloc
GetShortPathNameA
lstrcatA
MoveFileExA
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
FlushFileBuffers
SetStdHandle
InitializeCriticalSection
LoadLibraryA
VirtualAlloc
HeapReAlloc
CloseHandle
GetFileSize
FindFirstFileA
FindClose
SetFileAttributesA
DeleteFileA
lstrlenA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetLastError
WideCharToMultiByte
SetEnvironmentVariableA
SetCurrentDirectoryA
RemoveDirectoryA
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
user32
DefWindowProcA
TranslateMessage
MessageBoxA
wsprintfA
PeekMessageA
RegisterClassA
DispatchMessageA
FindWindowExA
PostMessageA
FindWindowA
LoadIconA
LoadCursorA
PostQuitMessage
gdi32
GetStockObject
advapi32
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHGetSpecialFolderLocation
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdat Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE