Static task
static1
Behavioral task
behavioral1
Sample
287bca7e188f8397c4e7b664a0cbb9c7254fbf095a4abe690074a7b4c1ad8f33.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
287bca7e188f8397c4e7b664a0cbb9c7254fbf095a4abe690074a7b4c1ad8f33.exe
Resource
win10v2004-20220901-en
General
-
Target
287bca7e188f8397c4e7b664a0cbb9c7254fbf095a4abe690074a7b4c1ad8f33
-
Size
198KB
-
MD5
a1274d19ab94cb8c6166ea0cadfb92f0
-
SHA1
28687a936df30891a8dcb0a81906bb68d21b30cb
-
SHA256
287bca7e188f8397c4e7b664a0cbb9c7254fbf095a4abe690074a7b4c1ad8f33
-
SHA512
e6479ada5f675085584a86d0039e3397040ff9c7bd2f28c907ecf6b1bcd4efef684699ab646dcfe0d91e75b7b621f20f9aec1a8a3d12870c6eed55133948b2c1
-
SSDEEP
3072:wsiz2V7AZmmyPJ6nrjp9BJvXXZogEDoA0sY4cTuWWnsETJeKQAvo:wP2V7Azjp9jvXJo+33CWWsEiao
Malware Config
Signatures
Files
-
287bca7e188f8397c4e7b664a0cbb9c7254fbf095a4abe690074a7b4c1ad8f33.exe windows x86
79ed1d63e1f8982b23328eea9bd4a097
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
CreateProcessA
GetLocaleInfoA
WinExec
GetSystemDirectoryA
GetCurrentDirectoryA
GetCommandLineA
Sleep
CreateMutexA
ReleaseMutex
SetFileAttributesA
DeleteFileA
MoveFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
GetSystemWindowsDirectoryA
CompareStringW
SetEnvironmentVariableA
SetFilePointer
WriteFile
lstrcmpA
GetWindowsDirectoryA
lstrcpynA
GetEnvironmentVariableA
GetFileAttributesA
CreateDirectoryA
GetPrivateProfileStringA
GetProcAddress
FreeLibrary
LoadLibraryA
GetCurrentThread
lstrcatA
GetCurrentProcess
GetLastError
lstrcmpiA
CreateFileA
ReadFile
CloseHandle
lstrlenA
lstrcpyA
MultiByteToWideChar
GlobalAlloc
GlobalLock
GlobalHandle
InterlockedExchange
CompareStringA
SetConsoleCtrlHandler
FlushFileBuffers
SetStdHandle
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GlobalUnlock
GlobalFree
LocalFree
GetBinaryTypeA
GetModuleFileNameA
LocalAlloc
GetVersionExA
SetLastError
GetCurrentThreadId
GetSystemDefaultLCID
WideCharToMultiByte
lstrlenW
lstrcpyW
RtlUnwind
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
HeapFree
GetCPInfo
GetACP
GetOEMCP
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetFullPathNameA
SetCurrentDirectoryA
HeapSize
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
user32
LoadKeyboardLayoutA
RegisterWindowMessageA
SystemParametersInfoA
wsprintfA
EnumWindows
UnloadKeyboardLayout
CharNextA
PostThreadMessageA
GetDC
wvsprintfA
ReleaseDC
GetClassNameA
SendMessageTimeoutA
PostMessageA
gdi32
TextOutA
advapi32
RegUnLoadKeyA
GetSidIdentifierAuthority
RegEnumKeyA
RegOpenKeyA
RegCreateKeyA
GetUserNameA
OpenThreadToken
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
InitializeSecurityDescriptor
RegSetKeySecurity
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
RegFlushKey
LookupPrivilegeValueA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetSidSubAuthorityCount
GetSidSubAuthority
FreeSid
IsValidSid
AllocateAndInitializeSid
GetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
StringFromGUID2
CoInitialize
CoUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
imm32
ImmInstallIMEA
Sections
.text Size: 136KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE