Static task
static1
Behavioral task
behavioral1
Sample
c90b4b254e0d4f3a8f7b7b1820996ec31ce7fc0b7411492ed1503dd1c8dbc1c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c90b4b254e0d4f3a8f7b7b1820996ec31ce7fc0b7411492ed1503dd1c8dbc1c5.exe
Resource
win10v2004-20220812-en
General
-
Target
c90b4b254e0d4f3a8f7b7b1820996ec31ce7fc0b7411492ed1503dd1c8dbc1c5
-
Size
297KB
-
MD5
417492d2a28a0344d87c469909c1f111
-
SHA1
b476934841095166d20ee4ddc1c3ff3143c13d80
-
SHA256
c90b4b254e0d4f3a8f7b7b1820996ec31ce7fc0b7411492ed1503dd1c8dbc1c5
-
SHA512
399de356a10cf0a09b6a17d4108662e4312960c55faf461e4833b13f22bc0eb75aed64e7eeb9226262dc4070133601d4acd8b04812cd1c8f86df17ff23f8167c
-
SSDEEP
3072:aweFEfwx0ASPtjP1H5BP01LtceXJpku2qY8rXfI+LZv6XxXcZpSUaglxM/SxAzgW:neWI2AAPlP01TJpSaXftRzZWgluaWR
Malware Config
Signatures
Files
-
c90b4b254e0d4f3a8f7b7b1820996ec31ce7fc0b7411492ed1503dd1c8dbc1c5.exe windows x86
3baab4c42462531129b0d86784a01e97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCurrentDirectoryA
SetThreadLocale
GetCurrentDirectoryA
LoadLibraryA
GetProcAddress
GetSystemDefaultLCID
GetModuleFileNameA
GetLastError
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
HeapFree
GetModuleHandleA
ExitProcess
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
GetFullPathNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
InitializeCriticalSection
SetStdHandle
GetFileType
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
Sleep
CloseHandle
RtlUnwind
SetEnvironmentVariableA
SetEnvironmentVariableW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
HeapSize
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
FlushFileBuffers
CompareStringA
CompareStringW
ReadFile
CreateFileA
GetStringTypeA
GetStringTypeW
SetEndOfFile
user32
MessageBoxA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ