Static task
static1
Behavioral task
behavioral1
Sample
857758a514756651cd2bc4879b79e4b2005eeb9908d4799064fc5f1671ae6df0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
857758a514756651cd2bc4879b79e4b2005eeb9908d4799064fc5f1671ae6df0.exe
Resource
win10v2004-20220812-en
General
-
Target
857758a514756651cd2bc4879b79e4b2005eeb9908d4799064fc5f1671ae6df0
-
Size
255KB
-
MD5
0a4b7cd140ed341848c3f1f3c268686f
-
SHA1
9005b4de0997fd4965c5ea0afcbef53868916558
-
SHA256
857758a514756651cd2bc4879b79e4b2005eeb9908d4799064fc5f1671ae6df0
-
SHA512
ac0f016338cc356b48a838b851daa7c7322ed8f85831c812cac380060a1a80526d16db436210d3c84a2814c3e5e2615979df883e7427e9d7a6fcb0fbcc74ebe5
-
SSDEEP
6144:THa1GJhn88ZTi9VQplEcN84NKVCVUGnyEf:uov8STiEp04NhSGf
Malware Config
Signatures
Files
-
857758a514756651cd2bc4879b79e4b2005eeb9908d4799064fc5f1671ae6df0.exe windows x86
fbc5bb92f67398b7cdfbb1a497ce7c00
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
GetFileSize
GetLocalTime
GetLocaleInfoA
GetModuleFileNameW
GetModuleHandleA
GetShortPathNameW
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetCurrentProcessId
SetEndOfFile
SetFilePointer
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WriteFile
lstrcmpiA
lstrlenA
GetCurrentProcess
FindNextFileA
CreateFileW
FindFirstFileA
FindClose
CloseHandle
GetWindowsDirectoryA
lstrcatA
CreateFileA
VirtualAllocEx
QueryPerformanceCounter
user32
SetFocus
MessageBoxA
IsDlgButtonChecked
IsDialogMessageA
TranslateMessage
EndDialog
DialogBoxParamA
CreateDialogParamA
LoadCursorA
LoadIconW
ShowWindow
GetDesktopWindow
SetForegroundWindow
CheckDlgButton
advapi32
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyA
RegOverridePredefKey
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
ole32
CoTaskMemRealloc
CoInitialize
CoGetMalloc
CoCreateInstance
CoUninitialize
shlwapi
StrFormatByteSize64A
wnsprintfA
comctl32
InitCommonControlsEx
Sections
.text8 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
FFF2 Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
FFF Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text7 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text5 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
9 Size: 1024B - Virtual size: 778B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ