Static task
static1
Behavioral task
behavioral1
Sample
f64ca63d7632552deef9e058c2439bcf224e67674d7ac37230e5ee28ed76d47a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f64ca63d7632552deef9e058c2439bcf224e67674d7ac37230e5ee28ed76d47a.exe
Resource
win10v2004-20220812-en
General
-
Target
f64ca63d7632552deef9e058c2439bcf224e67674d7ac37230e5ee28ed76d47a
-
Size
274KB
-
MD5
915bedbfe1f6c0d0c631d26cb06d41a0
-
SHA1
a8bf8202eff2ccd50b45b71e61aab3cedb06cfa8
-
SHA256
f64ca63d7632552deef9e058c2439bcf224e67674d7ac37230e5ee28ed76d47a
-
SHA512
96c0189243e803fb779514c3facd8f0e566c928697f11b07765f7c27e1c447acb3d4d562dcb95c08d3fef4795a44747d848c3c7a5acee11ce6ff7fdf7ea67f90
-
SSDEEP
6144:zKUHqc9pFk+1IF17rOcUHqsrujpRysFEhumGYxu0IVoy:bHqcFoF1XA7uV4CNmG
Malware Config
Signatures
Files
-
f64ca63d7632552deef9e058c2439bcf224e67674d7ac37230e5ee28ed76d47a.exe windows x86
12e77043d7af50220ab7209ed887e1d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetCPInfo
GetWindowsDirectoryA
lstrcatA
CreateFileA
VirtualAlloc
UnhandledExceptionFilter
GetCommandLineA
lstrlenW
MultiByteToWideChar
CreateEventA
GetCurrentThreadId
lstrlenA
lstrcmpiA
lstrcpyA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
UnmapViewOfFile
CloseHandle
ReleaseMutex
SetEvent
WaitForSingleObject
CreateProcessA
lstrcpynA
GetCurrentProcessId
DuplicateHandle
GetCurrentProcess
CreateMutexA
MapViewOfFile
CreateFileMappingA
WaitForMultipleObjects
GetModuleFileNameW
OpenProcess
GetLastError
SetUnhandledExceptionFilter
LocalFree
LocalAlloc
GetModuleHandleA
ExitThread
GetStartupInfoA
SetErrorMode
TerminateProcess
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
ExitProcess
SetFilePointer
FileTimeToDosDateTime
FileTimeToLocalFileTime
SetCurrentDirectoryA
CreateThread
FormatMessageA
GetVersion
DeleteCriticalSection
LeaveCriticalSection
GetFileAttributesA
GetCurrentDirectoryA
InitializeCriticalSection
HeapFree
HeapAlloc
SetLastError
GetDiskFreeSpaceA
CopyFileA
CreateDirectoryA
GetSystemDirectoryA
GetEnvironmentVariableA
DeleteFileA
SetFileAttributesA
WideCharToMultiByte
GetDriveTypeA
ExpandEnvironmentStringsA
LoadLibraryExA
DeviceIoControl
FindClose
FindNextFileA
FindFirstFileA
lstrcmpA
ResetEvent
WriteFile
SetCommState
GetCommState
SetCommTimeouts
ReadFile
GetProcessHeap
DebugBreak
IsDBCSLeadByte
OpenFileMappingA
GetTempFileNameA
GetTempPathA
EnterCriticalSection
user32
LoadIconA
LoadCursorW
LoadIconW
CharLowerA
GetClientRect
CopyRect
IsWindow
InvalidateRect
GetSysColor
SendDlgItemMessageA
SetFocus
SetWindowLongA
RedrawWindow
LoadImageA
EnumChildWindows
GetWindowLongA
GetWindowRect
ScreenToClient
SetWindowPos
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
wsprintfA
GetParent
PostMessageA
DialogBoxParamA
EnableWindow
EndDialog
GetDlgItem
SetTimer
FindWindowA
RegisterClassExA
LoadStringA
MessageBoxA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
SetForegroundWindow
EnumThreadWindows
PostQuitMessage
DefWindowProcA
ExitWindowsEx
gdi32
GetDeviceCaps
CreateFontIndirectA
AddFontResourceA
msvcrt
_except_handler3
_mbsrchr
_mbslen
__lconv_init
setlocale
_mbsinc
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_strnicmp
_stricmp
strtoul
_ftol
strncpy
strchr
strrchr
_mbschr
_c_exit
_wcsicmp
isleadbyte
memmove
towlower
atoi
isspace
free
wcsncpy
strncmp
comdlg32
GetOpenFileNameA
advapi32
RegOpenKeyExA
RegOpenKeyA
LookupPrivilegeValueA
OpenProcessToken
LookupAccountSidA
GetTokenInformation
FreeSid
EqualSid
AllocateAndInitializeSid
RegCloseKey
RegQueryValueExA
RegEnumKeyA
RegQueryValueA
RegEnumKeyExA
RegSetValueExA
AdjustTokenPrivileges
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
SHGetFileInfoA
SHBrowseForFolderA
SHGetSpecialFolderLocation
ole32
OleUninitialize
OleInitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
CoUninitialize
comctl32
PropertySheetA
InitCommonControlsEx
CreatePropertySheetPageA
Sections
FFFFF1 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
FFFFF Size: 226KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
FFFF Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
FFFFF3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
FFFFF2 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ