Static task
static1
Behavioral task
behavioral1
Sample
20b51ea675ef5eb1eda0ffada43b4809b9cd87cb9379d8edabc63d84939b1005.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20b51ea675ef5eb1eda0ffada43b4809b9cd87cb9379d8edabc63d84939b1005.exe
Resource
win10v2004-20220812-en
General
-
Target
20b51ea675ef5eb1eda0ffada43b4809b9cd87cb9379d8edabc63d84939b1005
-
Size
689KB
-
MD5
6326c3ab6d5dc072d98ff8e240bc3d9e
-
SHA1
6bd3cd9ed53f04269281a2a77765a2f2c83e7a8d
-
SHA256
20b51ea675ef5eb1eda0ffada43b4809b9cd87cb9379d8edabc63d84939b1005
-
SHA512
b860acdbf76b913e262cfc1782eaa100dd307bb4818c6bc839e2d4e27fb0e08f99fcfe0e033125a90af8640b63f6f94744392256761f93eb91e7659de09f6732
-
SSDEEP
12288:ONHfx2B3UKNtlAwg9/D0i22AKhe6yokXeFv+w6+SN6zSOt:ONHJcUKNq5pVAeFWw6+E6zn
Malware Config
Signatures
Files
-
20b51ea675ef5eb1eda0ffada43b4809b9cd87cb9379d8edabc63d84939b1005.exe windows x86
a6ddbcba5827790bcdcb066d3fa35c7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueA
RegCreateKeyExA
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
kernel32
GetCurrentThread
GetVersion
GetTickCount
GetLastError
GetCurrentProcessId
GetModuleHandleA
GetCommandLineA
GetCurrentThreadId
ExitProcess
HeapAlloc
GetProcessHeap
VirtualAlloc
Sleep
VirtualFree
UnmapViewOfFile
IsValidCodePage
GetACP
CloseHandle
ReadFile
TlsFree
MapViewOfFile
RaiseException
HeapSize
GetCPInfo
LockResource
GetEnvironmentStrings
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
LCMapStringW
InterlockedIncrement
TlsSetValue
GetFileType
CreateEventA
GetTimeZoneInformation
GlobalLock
FindFirstFileW
CompareStringA
lstrcpyA
FindNextFileW
CompareStringW
GetProcAddress
SetEvent
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
SetHandleCount
HeapFree
WriteConsoleW
SetCurrentDirectoryA
LeaveCriticalSection
GetLocaleInfoA
SetEndOfFile
CreateEventW
GetConsoleMode
VirtualQuery
WriteConsoleA
TerminateProcess
SetUnhandledExceptionFilter
CreateThread
SetFilePointer
CreateMutexA
InterlockedDecrement
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
IsDebuggerPresent
VirtualProtect
SetLastError
TlsGetValue
FindClose
LoadResource
InitializeCriticalSection
FormatMessageW
LocalFree
GetOEMCP
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
WideCharToMultiByte
GetTempPathA
SetStdHandle
FreeEnvironmentStringsW
SetErrorMode
CreateFileA
lstrcatA
LocalAlloc
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
WaitForSingleObject
GetStdHandle
user32
GetClientRect
SendMessageA
InvalidateRect
SystemParametersInfoA
SetForegroundWindow
GetDlgItem
CreateWindowExA
SetWindowLongA
GetWindowRect
GetSystemMetrics
DefWindowProcA
BeginPaint
FillRect
SetTimer
GetWindowLongA
RegisterClassA
EnableMenuItem
TranslateMessage
EnableWindow
ShowWindow
UpdateWindow
DestroyWindow
GetDC
EndPaint
DispatchMessageA
IsWindow
SetWindowPos
ReleaseDC
PostQuitMessage
Sections
.text Size: 645KB - Virtual size: 971KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ