Static task
static1
Behavioral task
behavioral1
Sample
697fbecbf3a0e78eb55140dc71265e626d5bea273302e2771756b06e2ca42d3c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
697fbecbf3a0e78eb55140dc71265e626d5bea273302e2771756b06e2ca42d3c.exe
Resource
win10v2004-20220812-en
General
-
Target
697fbecbf3a0e78eb55140dc71265e626d5bea273302e2771756b06e2ca42d3c
-
Size
152KB
-
MD5
78307d6890f1205486dd31c82d060a55
-
SHA1
997a2a1862213e4e846eae39db1458395f2353c1
-
SHA256
697fbecbf3a0e78eb55140dc71265e626d5bea273302e2771756b06e2ca42d3c
-
SHA512
1c15cfcc17b0e525ff69b9a50670648261a3e0342fa3bd56a3c06c06b3a55740d1b8078a2e9ca7ad712e7cafb0a0a4b29749aa466805a234027dd1cad631fa79
-
SSDEEP
3072:9x5JFHUGc1CSrW6pJ3SLncMfdKJ+XocWVWCfIFHEB4:9fJF81Cb6pMbPlbX81f+HM4
Malware Config
Signatures
Files
-
697fbecbf3a0e78eb55140dc71265e626d5bea273302e2771756b06e2ca42d3c.exe windows x86
bef85d1caf40c1ae5f5f280d72946305
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GlobalAlloc
MultiByteToWideChar
lstrlenW
WriteFile
lstrcatW
CreateFileA
GetTempFileNameA
GetTempPathA
lstrcmpW
ReadFile
GetLocalTime
SetFilePointer
GetCurrentProcess
GetModuleFileNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetWindowsDirectoryA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
GetDriveTypeA
GlobalFree
CopyFileA
SetFileAttributesA
WritePrivateProfileStringA
GetFileSize
WaitForSingleObject
OpenMutexA
GetSystemDirectoryA
GetVersionExA
LocalFree
LocalAlloc
OutputDebugStringA
lstrcpynA
SetStdHandle
SetConsoleCtrlHandler
GetTimeZoneInformation
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
CreateProcessA
lstrcpyW
CreateMutexA
GetLastError
LoadLibraryA
FreeLibrary
ReleaseMutex
SetEnvironmentVariableA
CloseHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetErrorMode
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
GetProcAddress
InterlockedExchange
RaiseException
HeapReAlloc
HeapAlloc
RtlUnwind
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
HeapFree
ExitProcess
TerminateProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
VirtualFree
VirtualAlloc
IsBadWritePtr
GetEnvironmentVariableA
HeapDestroy
HeapCreate
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
LCMapStringA
LCMapStringW
HeapSize
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
user32
ExitWindowsEx
CharNextA
MessageBoxA
LoadStringA
comdlg32
GetOpenFileNameA
advapi32
FreeSid
RegOpenKeyA
GetTokenInformation
AllocateAndInitializeSid
EqualSid
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
ole32
CoTaskMemFree
CLSIDFromString
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggcvqkl Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE