Static task
static1
Behavioral task
behavioral1
Sample
f19dec3a59ad4402999c32aee2d98ce0938179803df3bf456714cf54ba6711fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f19dec3a59ad4402999c32aee2d98ce0938179803df3bf456714cf54ba6711fe.exe
Resource
win10v2004-20220812-en
General
-
Target
f19dec3a59ad4402999c32aee2d98ce0938179803df3bf456714cf54ba6711fe
-
Size
112KB
-
MD5
5060e835b3a5af08ee19809547c179d0
-
SHA1
112e8d63567bbe881c52965418c8381f8e6fc6f3
-
SHA256
f19dec3a59ad4402999c32aee2d98ce0938179803df3bf456714cf54ba6711fe
-
SHA512
de4c6a32b9f0dd34d33523aa31fdc99032dfe6439405af9d3010711212efeeb6ad164fd255d902fbccf670289866ff5f8bbae407bdaaa71ae14d3d5d9dc4df9e
-
SSDEEP
1536:dC+MLnevIdolaAm9vYQfQuTr1WkXJOxDF/H897sNxtpcYGVHeUdNU7D3QjEBrM:vHlOw4HZJOxh/2YHtKP3NwLQjYo
Malware Config
Signatures
Files
-
f19dec3a59ad4402999c32aee2d98ce0938179803df3bf456714cf54ba6711fe.exe windows x86
2d91997d29096df38c9929715e243bfd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetSystemMetrics
GetDesktopWindow
GetDC
ReleaseDC
gdi32
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
GetObjectA
kernel32
SetEnvironmentVariableA
ReadFile
FlushFileBuffers
GetEnvironmentStringsW
CompareStringW
OutputDebugStringA
GetModuleFileNameA
LocalAlloc
GlobalFree
CloseHandle
WriteFile
CreateFileA
GlobalAlloc
Sleep
DeleteFileA
LocalFree
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetProcAddress
GetModuleHandleA
ExitProcess
GetFileAttributesA
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
RtlUnwind
LoadLibraryA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CompareStringA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jwuaagu Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE