Static task
static1
Behavioral task
behavioral1
Sample
0fe48c35f6c2cf4c3e9b5b74ae84b4a8f63351ce6715e8091a2812084d05fea5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0fe48c35f6c2cf4c3e9b5b74ae84b4a8f63351ce6715e8091a2812084d05fea5.exe
Resource
win10v2004-20220812-en
General
-
Target
0fe48c35f6c2cf4c3e9b5b74ae84b4a8f63351ce6715e8091a2812084d05fea5
-
Size
96KB
-
MD5
767529194e4c642b18be94c03db96032
-
SHA1
a5aac11985174144b6fc268ee44ccfd34247ca10
-
SHA256
0fe48c35f6c2cf4c3e9b5b74ae84b4a8f63351ce6715e8091a2812084d05fea5
-
SHA512
ba82628a2658dbae02535f1dfc2621b621fa245a59e4d47cf103a94ee4b79bbea8c8ae1194e0ccb1cc27aee39a728332d3389a704dc240e74f9db0458f093c14
-
SSDEEP
1536:t7vek/f0exu04aXoZcotAXjbKYCPhBCXT/GfJqHoF30Q5:tTemfR4aPTX/GJkjYwHoFEm
Malware Config
Signatures
Files
-
0fe48c35f6c2cf4c3e9b5b74ae84b4a8f63351ce6715e8091a2812084d05fea5.exe windows x86
33050e9d094cbc5d027cd3c60420d692
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetModuleFileNameA
MultiByteToWideChar
GetThreadPriority
GetFileType
GetProcessVersion
CreateThread
HeapAlloc
OpenProcess
HeapFree
GetLastError
SetLastError
GetProcAddress
CreateFileA
GetComputerNameA
Process32Next
GetCurrentProcessId
GetSystemDefaultLCID
LoadLibraryA
GetShortPathNameA
GetModuleHandleA
CloseHandle
GetProcessHeap
GetOEMCP
GetACP
GetCPInfo
SetStdHandle
IsBadCodePtr
IsBadReadPtr
LCMapStringW
LCMapStringA
FindClose
GetFileSize
Sleep
GetCurrentThreadId
GetCurrentThread
SetErrorMode
GetTickCount
GetCurrentProcess
CreateToolhelp32Snapshot
GetStringTypeW
GetStringTypeA
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetStartupInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
SetEndOfFile
user32
GetWindowLongA
GetMessageA
GetWindowRect
GetActiveWindow
GetForegroundWindow
GetClassLongA
GetWindow
GetDesktopWindow
advapi32
StartServiceA
OpenProcessToken
SetServiceStatus
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
OpenSCManagerW
shell32
ShellExecuteExW
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ