Static task
static1
Behavioral task
behavioral1
Sample
157e4422ecf802750e3b1ba9fd9d13cc1bd30216201c26847ab7c576d71a8466.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
157e4422ecf802750e3b1ba9fd9d13cc1bd30216201c26847ab7c576d71a8466.exe
Resource
win10v2004-20220812-en
General
-
Target
157e4422ecf802750e3b1ba9fd9d13cc1bd30216201c26847ab7c576d71a8466
-
Size
928KB
-
MD5
205701510d4a0ec390135dfdfb687f53
-
SHA1
2b3462f091e27b30a0c2b50627c446cb33c677e6
-
SHA256
157e4422ecf802750e3b1ba9fd9d13cc1bd30216201c26847ab7c576d71a8466
-
SHA512
a0ecc4734b8e8f6afdf5340d8f3a30d4e15a179344f1a39adc137533e97bff28f32abbc652b91cd44f7cc6eb9b8f6f0274adf077c8c3b43aff3cfc31cb5d5fdd
-
SSDEEP
3072:M++YgG4jF0gtALAXLi9CaBl5gIP3UsmeYEgtf:pRmICwWebK
Malware Config
Signatures
Files
-
157e4422ecf802750e3b1ba9fd9d13cc1bd30216201c26847ab7c576d71a8466.exe windows x86
1bebe70dd9f18c40187b0e74b0af3420
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
BuildCommDCBW
FormatMessageA
FormatMessageW
GetCurrentProcess
GetNumberFormatW
GetProfileStringW
GetTempPathW
GetWindowsDirectoryW
LocalAlloc
LocalFree
MoveFileW
QueryDosDeviceW
ReadConsoleInputW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
WaitCommEvent
WriteProfileStringW
lstrcatW
lstrcmpiW
lstrcpyW
GetProcAddress
GetModuleHandleA
ExitProcess
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
IsDebuggerPresent
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
SetFilePointer
SetHandleCount
GetFileType
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCurrentProcessId
GetFileAttributesW
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
RtlUnwind
GetLocaleInfoA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessA
GetFileAttributesA
RaiseException
FlushFileBuffers
CreateFileA
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
rpcrt4
NdrByteCountPointerBufferSize
RpcEpResolveBinding
I_RpcParseSecurity
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 528KB - Virtual size: 539KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE