Static task
static1
Behavioral task
behavioral1
Sample
a620b867ff599c51c1c7b188b3b927b0c455b6832f24cf96f4132209114ecd99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a620b867ff599c51c1c7b188b3b927b0c455b6832f24cf96f4132209114ecd99.exe
Resource
win10v2004-20220812-en
General
-
Target
a620b867ff599c51c1c7b188b3b927b0c455b6832f24cf96f4132209114ecd99
-
Size
608KB
-
MD5
800906f635ac86cf6ec7fc0fd1010d80
-
SHA1
764d3b0cb534d3ac7dfd6d43779f16eed69ae8cd
-
SHA256
a620b867ff599c51c1c7b188b3b927b0c455b6832f24cf96f4132209114ecd99
-
SHA512
a4599936c8577984b2c66444565651c2b80c230ef05bb2761c34df4594f3d1d01c3b4277e86bda471f365078bbdd104931e6907fd79784066c5fbb481b1baa87
-
SSDEEP
12288:i7ryMaPIZ2Ti7NVQgCZYLftkc4cf5e3Mmo7fY:iWU2TOVQTZYLfqcxEMmo
Malware Config
Signatures
Files
-
a620b867ff599c51c1c7b188b3b927b0c455b6832f24cf96f4132209114ecd99.exe windows x86
5d5ebf42adc7b14e3ffc09759781b5c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
lstrcpyA
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryA
CreateDirectoryA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFileAttributesA
GetVolumeInformationA
SetErrorMode
GetFileAttributesA
FindNextFileA
FindFirstFileA
lstrcatA
FindClose
GetCurrentDirectoryA
GetLocaleInfoW
SetEndOfFile
lstrcmpA
CreateProcessA
GetModuleFileNameA
GetDriveTypeA
SleepEx
lstrlenA
GetLogicalDriveStringsA
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
HeapReAlloc
TerminateProcess
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetLastError
WriteFile
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
ReadFile
GetACP
GetOEMCP
CreateFileA
SetEnvironmentVariableA
user32
ExitWindowsEx
FindWindowA
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyA
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 420KB - Virtual size: 440KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE