Static task
static1
Behavioral task
behavioral1
Sample
1996e8f2e6b0131144787c531111184bd9d4ce7ee1438e002c95cbe3c4bbcaad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1996e8f2e6b0131144787c531111184bd9d4ce7ee1438e002c95cbe3c4bbcaad.exe
Resource
win10v2004-20220812-en
General
-
Target
1996e8f2e6b0131144787c531111184bd9d4ce7ee1438e002c95cbe3c4bbcaad
-
Size
154KB
-
MD5
a1bb97fe83a412f5f5b1153307309c90
-
SHA1
c50ddb3c907c517cfea00637ee5ac9ddbc23655d
-
SHA256
1996e8f2e6b0131144787c531111184bd9d4ce7ee1438e002c95cbe3c4bbcaad
-
SHA512
a2a8f30f13af9bca7ea07f4ae16a59135358a31edd4684a3ca3b1f61c8f70a0c916ad17407229f3e4e3f2137b4bf25dcdc3d3d5b473b9f38c350d83a1714ef4e
-
SSDEEP
3072:8SlNAyx1+fhvFoEdqhJEkiLgnP19ip8AtIXPcqKG1j+T:h71WNPsE9LitABIXUS1Q
Malware Config
Signatures
Files
-
1996e8f2e6b0131144787c531111184bd9d4ce7ee1438e002c95cbe3c4bbcaad.exe windows x86
ded7e5632e4e3bd899cbbaea82ea5553
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
CreateThread
CompareFileTime
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
GetLastError
DeleteCriticalSection
InitializeCriticalSection
SetProcessShutdownParameters
lstrcmpiA
GetTickCount
FindNextFileA
CreateDirectoryA
GetTempFileNameA
EnterCriticalSection
GetFileTime
LeaveCriticalSection
DeleteFileA
GetFileSize
CreateFileA
WaitForSingleObject
UnmapViewOfFile
lstrlenA
lstrcpyA
lstrcatA
CreateFileMappingA
MapViewOfFile
GetTempPathA
FindClose
LocalFree
GetBinaryTypeA
GetModuleFileNameA
LocalAlloc
GetVersionExA
lstrcpynA
GetCurrentProcess
SetLastError
GetEnvironmentVariableA
ReleaseMutex
GlobalFree
FlushViewOfFile
lstrlenW
GlobalLock
GlobalUnlock
GlobalHandle
IsBadCodePtr
SetErrorMode
CreateProcessA
GetDriveTypeA
SetFileTime
SystemTimeToFileTime
GetSystemTime
LockResource
LoadResource
SizeofResource
FindResourceA
LoadLibraryExA
GetFileAttributesA
SetFilePointer
ReadFile
GetCurrentThreadId
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapReAlloc
HeapAlloc
TerminateProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
GetCPInfo
GetACP
GetOEMCP
SetConsoleCtrlHandler
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
GlobalAlloc
CreateMutexA
InterlockedExchange
user32
wsprintfA
CharNextA
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
SetTimer
SendMessageA
PostMessageA
RegisterWindowMessageA
PostThreadMessageA
advapi32
FreeSid
AllocateAndInitializeSid
IsValidSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetSecurityDescriptorDacl
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegSetValueExA
RegCreateKeyExA
RegUnLoadKeyA
RegDeleteValueA
RegDeleteKeyA
imm32
ImmDisableIME
Sections
.text Size: 108KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE