Static task
static1
Behavioral task
behavioral1
Sample
604820a0dd866defb6a358f8eabd084ac7404c00b743be4696d12cd7c735866f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
604820a0dd866defb6a358f8eabd084ac7404c00b743be4696d12cd7c735866f.exe
Resource
win10v2004-20220812-en
General
-
Target
604820a0dd866defb6a358f8eabd084ac7404c00b743be4696d12cd7c735866f
-
Size
85KB
-
MD5
805a724dc093f7cbc6828c78150bd9f0
-
SHA1
9f34ee610e00352b7a5ff9a36b35807c52f343e3
-
SHA256
604820a0dd866defb6a358f8eabd084ac7404c00b743be4696d12cd7c735866f
-
SHA512
447035c242e47cb05433a6c6e9b4d661b6c6fd437fd669ca9c42963f81578b0499987f1d577e78c303d7a4a2c7a470a861c46496ea89cdf396e1d5bf6b61b8e2
-
SSDEEP
1536:KL+/blHe0pqAnmnIeOCJ1v4f8UdBeuRZ5h7U6wKSmEm:M+/jmnIZ2dm8UiuRZ5h7UkSmEm
Malware Config
Signatures
Files
-
604820a0dd866defb6a358f8eabd084ac7404c00b743be4696d12cd7c735866f.exe windows x86
682720d25d5b2708f734e513daa7e05a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReadFile
GetFileSize
CreateDirectoryA
GetLastError
CreateFileA
DeleteFileA
LocalFree
FormatMessageA
GetWindowsDirectoryA
FindFirstFileA
CompareFileTime
SetFilePointer
SetFileAttributesA
GetModuleFileNameA
MoveFileA
GetLocalTime
RtlMoveMemory
FileTimeToDosDateTime
SystemTimeToFileTime
FileTimeToSystemTime
Sleep
FindClose
FileTimeToLocalFileTime
FindNextFileA
ord2
WriteFile
GlobalAlloc
WideCharToMultiByte
GetStringTypeA
HeapReAlloc
LoadLibraryA
GetProcAddress
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
SetEndOfFile
GlobalFree
GetStdHandle
GetStringTypeW
UnhandledExceptionFilter
HeapFree
HeapAlloc
ResumeThread
CreateThread
TlsSetValue
ExitThread
GetFileType
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapCreate
SetHandleCount
RtlUnwind
SetStdHandle
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCurrentThreadId
TlsAlloc
SetLastError
TlsGetValue
user32
TranslateMessage
DestroyWindow
DispatchMessageA
GetMessageA
CreateDialogParamA
MessageBoxA
FindWindowA
IsIconic
BringWindowToTop
GetLastActivePopup
SetForegroundWindow
GetClassInfoA
LoadIconA
RegisterClassA
GetSystemMenu
EnableMenuItem
SetDlgItemTextA
ShowWindow
ExitWindowsEx
PostMessageA
LoadStringA
advapi32
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegFlushKey
comctl32
ord17
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 489B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE