Static task
static1
Behavioral task
behavioral1
Sample
f7bcacf9a2c23942bc9804f5a7ba17a0e5d2d671959ea1059f614cec0569f0ea.exe
Resource
win7-20220812-en
General
-
Target
f7bcacf9a2c23942bc9804f5a7ba17a0e5d2d671959ea1059f614cec0569f0ea
-
Size
491KB
-
MD5
14d814ad4116c4f77aad2a69b34932b8
-
SHA1
1111f05b4cc4504171062f0c922fc2e911a94593
-
SHA256
f7bcacf9a2c23942bc9804f5a7ba17a0e5d2d671959ea1059f614cec0569f0ea
-
SHA512
4cc6e77cbd03419a8c69a3a3238483bed68961a046e6b2fde70335e20d8dc0ad96c848803baa7a92dad5f7514f2fdec7d8d994fc1feac4b4511955e713d98d90
-
SSDEEP
12288:Hmurb1khd9gymVai75IduCcXcOIkdt/aag2ApnAOL:Gurb69wVaimsCcX1/ax2ApnXL
Malware Config
Signatures
Files
-
f7bcacf9a2c23942bc9804f5a7ba17a0e5d2d671959ea1059f614cec0569f0ea.exe windows x86
f968009600c7108dda8aecb8c38d35d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceExA
GetFileInformationByHandle
CreateFileA
CreateProcessA
GetExitCodeProcess
WaitForSingleObject
FreeLibrary
OpenProcess
HeapAlloc
HeapFree
GetProcessHeap
GetProcAddress
LoadLibraryA
WriteFile
ReadFile
CloseHandle
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
MoveFileA
CreateThread
IsDBCSLeadByte
WritePrivateProfileStringA
DeleteFileA
GetModuleFileNameA
SetCurrentDirectoryA
CreateDirectoryA
FindResourceExA
LoadResource
LockResource
GetSystemDefaultLCID
WideCharToMultiByte
GetVersionExA
GetCurrentThread
GetLastError
GetCurrentProcess
LocalAlloc
LocalFree
GetTempPathA
GetTempFileNameA
GetPrivateProfileStringA
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
user32
GetWindowLongA
SetWindowLongA
PostMessageA
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
RegisterClassExA
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
PostQuitMessage
advapi32
RegQueryValueExA
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteExA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE