Static task
static1
Behavioral task
behavioral1
Sample
62f23a231057c0521a83877e48f12f5de500048176033ae6742d1ce08f745b3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
62f23a231057c0521a83877e48f12f5de500048176033ae6742d1ce08f745b3b.exe
Resource
win10v2004-20220901-en
General
-
Target
62f23a231057c0521a83877e48f12f5de500048176033ae6742d1ce08f745b3b
-
Size
92KB
-
MD5
a2054d9fe58afb2eed45130400752d90
-
SHA1
a02d680ca5d38307c0c5eb4658402600abde5c55
-
SHA256
62f23a231057c0521a83877e48f12f5de500048176033ae6742d1ce08f745b3b
-
SHA512
448246cd89fdbe7ec171a07c0bc8e382b248c9f3b56f4abb300408d9b3e5a05a181df7828751e3f982b757c9caece54fad9a6cc0b97a1210fbe1dc9b9cf21d47
-
SSDEEP
1536:AE2M43TyjvrXu29bw/X0I0ytLQDMzQj6GpnoJItSyCnPvwmqNk0BXlwh/Vx4:AtEeL0oLQ5jEITCnPbAdXlkx4
Malware Config
Signatures
Files
-
62f23a231057c0521a83877e48f12f5de500048176033ae6742d1ce08f745b3b.exe windows x86
6b5f321d5510881437fd706e880b096c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
lstrcpyA
CreateProcessA
lstrcatA
GetWindowsDirectoryA
DuplicateHandle
GetCurrentProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
GetComputerNameA
lstrcmpA
CopyFileA
DeleteFileA
SetFileAttributesA
VirtualProtectEx
lstrlenA
GetSystemDirectoryA
GetFileSize
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetProcessHeap
CreateRemoteThread
SetLastError
GetCurrentProcessId
VirtualFree
WriteProcessMemory
Sleep
GetModuleHandleA
GetProcAddress
WaitForSingleObject
WriteFile
CloseHandle
VirtualAlloc
GetPriorityClass
ResumeThread
user32
FindWindowA
GetWindowThreadProcessId
wsprintfA
advapi32
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
GetUserNameA
RegSetValueExA
shlwapi
SHDeleteKeyA
msvcrt
_strrev
strrchr
strncpy
strchr
atoi
free
malloc
_strnicmp
_stricmp
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�� Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ