Static task
static1
Behavioral task
behavioral1
Sample
79379941ab221edaa103a9e267e9fbc9e1066a20028d23bc009b10918e1287f0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79379941ab221edaa103a9e267e9fbc9e1066a20028d23bc009b10918e1287f0.exe
Resource
win10v2004-20220812-en
General
-
Target
79379941ab221edaa103a9e267e9fbc9e1066a20028d23bc009b10918e1287f0
-
Size
91KB
-
MD5
818680e062737d70ffb795a460029990
-
SHA1
2ba4ab5ee1c38fbdc73379aecf11a6a40b661757
-
SHA256
79379941ab221edaa103a9e267e9fbc9e1066a20028d23bc009b10918e1287f0
-
SHA512
dbaba3f715fcd49e72eca605a598f0745657241869833f967cf26c86f025ae4db8550a393b70b6ed6eb2d5c39a54fd6f6544d346e8180dd2892d4b40e8efb84b
-
SSDEEP
1536:bLMM9mu5aUgSeBSvyH+/9evgl4F4EkUctmMTT90Bzmnfiv+4DILy4:bLX91hhyeaF4IctmMTOjv1Ie4
Malware Config
Signatures
Files
-
79379941ab221edaa103a9e267e9fbc9e1066a20028d23bc009b10918e1287f0.exe windows x86
895f72da3da069557a616d3d87dbca70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
kernel32
GetSystemDirectoryA
GetWindowsDirectoryA
CloseHandle
WaitForSingleObject
CreateProcessA
FindNextFileA
FindFirstFileA
GetTempPathA
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
SetFilePointer
Sleep
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
ReadFile
HeapSize
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
CreateFileA
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
shlwapi
SHDeleteKeyA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE