Static task
static1
Behavioral task
behavioral1
Sample
f0156902f70b531511594f5182297f9077362e5414f1d1deb0e4c16be8eb67a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0156902f70b531511594f5182297f9077362e5414f1d1deb0e4c16be8eb67a2.exe
Resource
win10v2004-20220812-en
General
-
Target
f0156902f70b531511594f5182297f9077362e5414f1d1deb0e4c16be8eb67a2
-
Size
69KB
-
MD5
a21af53c1cddbcd7de0b51a404be4780
-
SHA1
4d5a76d51c679e72889d959edae772cc439274c5
-
SHA256
f0156902f70b531511594f5182297f9077362e5414f1d1deb0e4c16be8eb67a2
-
SHA512
ba884a622a10e5be6c790d1b9b3fbb71f586fa042274bccf686fe1bce346efce97fb556573e242d533050b410a2416ce1e43c7f90c2a50bd70b3f974fe0d576a
-
SSDEEP
1536:QCSZU6nSD5n89ITWykkTrJdYJQFYM6d/sL:QjyISD5n8aSCTrJdYJDk
Malware Config
Signatures
Files
-
f0156902f70b531511594f5182297f9077362e5414f1d1deb0e4c16be8eb67a2.exe windows x86
b8afe818119b0956d594162f32f1e914
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetPriorityClass
SetThreadPriority
SetProcessPriorityBoost
CreateThread
GetSystemTime
GetTickCount
LeaveCriticalSection
EnterCriticalSection
lstrlenW
GetVersionExW
GetProcAddress
GetModuleHandleW
OpenProcess
Sleep
LoadLibraryW
GetExitCodeProcess
TerminateProcess
CreateProcessW
lstrcatA
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
HeapAlloc
RtlUnwind
WideCharToMultiByte
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetCurrentProcessId
QueryPerformanceCounter
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
GetEnvironmentVariableA
GetCurrentProcess
lstrcpyA
GetShortPathNameA
GetModuleFileNameA
WriteFile
DeleteFileW
ReleaseMutex
CloseHandle
ReadFile
CreateMutexA
OpenFile
CreateFileW
VirtualFree
VirtualProtect
VirtualAlloc
GetModuleFileNameW
GetLastError
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetSystemTimeAsFileTime
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
user32
SetWindowTextW
DefWindowProcW
BeginPaint
EndPaint
GetSysColorBrush
SendMessageW
SetCursor
CreateWindowExW
GetSystemMetrics
RegisterClassExW
LoadCursorW
LoadIconW
DispatchMessageW
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
SystemParametersInfoW
SetWindowsHookExW
GetWindowTextW
gdi32
DeleteDC
CreateCompatibleDC
GetObjectW
MoveToEx
Rectangle
CreatePen
TextOutW
SelectObject
BitBlt
DeleteObject
SetTextColor
SetBkMode
CreateFontW
LineTo
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
shell32
ShellExecuteExA
shlwapi
StrCpyW
StrCatW
StrCmpW
psapi
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
gdiplus
GdiplusShutdown
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ