Static task
static1
Behavioral task
behavioral1
Sample
89e4e10a19ad43270a9ddeaff19075062a8dd17ad04089c2311b93f3a95ca00f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
89e4e10a19ad43270a9ddeaff19075062a8dd17ad04089c2311b93f3a95ca00f.exe
Resource
win10v2004-20220901-en
General
-
Target
89e4e10a19ad43270a9ddeaff19075062a8dd17ad04089c2311b93f3a95ca00f
-
Size
750KB
-
MD5
671927e0c0132e75b0160b21b49df680
-
SHA1
7794f09d94e083761b8729a2ec6674dd242bf0ed
-
SHA256
89e4e10a19ad43270a9ddeaff19075062a8dd17ad04089c2311b93f3a95ca00f
-
SHA512
dfbebe8dc367fef2ed4d2446d9fc72a6e2c95035cd0d6f0ace6a53f6ee893332cdb5a5cb9cec481abe0bc93dd0a5519d2bb97c833d2d730c7ecb3348350c265d
-
SSDEEP
12288:6m3mvbuv5L2yjnVZ0/IgkxGhmxjQHR7nKm/Se2QUNZqx:6m3mv6vDVIIgkxwjRzSe2QgZqx
Malware Config
Signatures
Files
-
89e4e10a19ad43270a9ddeaff19075062a8dd17ad04089c2311b93f3a95ca00f.exe windows x64
80fdfc2b3586e098645bc4d43eddbcde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CopyFileA
SetFileAttributesA
FindClose
GetPrivateProfileStringA
LocalAlloc
WritePrivateProfileStringA
GetSystemInfo
GetModuleFileNameA
GetPrivateProfileSectionA
CompareStringA
GetUserDefaultUILanguage
CloseHandle
GetVersion
LocalFree
DeleteFileA
FreeResource
MapViewOfFile
UnmapViewOfFile
_llseek
FreeLibrary
LoadResource
_lwrite
GlobalLock
_lclose
GetTickCount
EnumResourceTypesA
FindResourceExA
GlobalAlloc
SizeofResource
GetProcAddress
GlobalUnlock
SetLastError
GlobalFree
GetTempFileNameA
CreateFileMappingA
MoveFileA
LockResource
_lread
LoadLibraryExA
EnumResourceNamesA
GetFileInformationByHandle
GetTempPathA
GetCurrentDirectoryA
GetSystemTime
WideCharToMultiByte
MultiByteToWideChar
lstrcmpiA
GetLastError
FindFirstFileA
CreateDirectoryA
GetShortPathNameA
ReadFile
CreateProcessA
GetExitCodeProcess
GetFileAttributesA
GetPrivateProfileIntA
WriteFile
FormatMessageA
GetModuleHandleW
WritePrivateProfileSectionA
lstrcmpA
Sleep
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetVersionExA
IsDBCSLeadByte
CreateFileA
EnumResourceLanguagesA
GetFullPathNameA
gdi32
GetStockObject
GetDeviceCaps
CreateFontIndirectA
DeleteObject
GetObjectA
CreateFontIndirectW
user32
IsDlgButtonChecked
ShowWindow
CheckDlgButton
GetWindowRect
SystemParametersInfoW
CharPrevA
GetDlgItemTextA
SetDlgItemTextA
GetWindowLongPtrA
SendDlgItemMessageA
MsgWaitForMultipleObjects
LoadStringA
GetParent
MessageBeep
CharNextA
SetFocus
SendMessageA
GetDC
MessageBoxA
PeekMessageA
ReleaseDC
GetDlgItem
SetWindowLongPtrA
PostMessageA
DispatchMessageA
GetSystemMetrics
EnableWindow
CallWindowProcA
CheckRadioButton
msvcrt
memcpy
_itoa
_itoa_s
free
_commode
_acmdln
__C_specific_handler
_initterm
__setusermatherr
_ismbblead
_fmode
?terminate@@YAXXZ
_cexit
_exit
exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
wcsncmp
mbstowcs
_splitpath_s
strtoul
toupper
memcpy_s
_vsnprintf
strtok
strchr
malloc
memset
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
comctl32
CreatePropertySheetPageA
PropertySheetA
DestroyPropertySheetPage
comdlg32
GetOpenFileNameA
GetSaveFileNameA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
imagehlp
CheckSumMappedFile
advapi32
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 588KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE