Static task
static1
Behavioral task
behavioral1
Sample
b25089fdac7b264b1e7aaec191455d5f41ca0564b7055e956683cc05de13ff2c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b25089fdac7b264b1e7aaec191455d5f41ca0564b7055e956683cc05de13ff2c.exe
Resource
win10v2004-20220901-en
General
-
Target
b25089fdac7b264b1e7aaec191455d5f41ca0564b7055e956683cc05de13ff2c
-
Size
108KB
-
MD5
7b2ea8215caad22910b4f47008c5c505
-
SHA1
7549e0ad22da2900f539c23de263171633254a22
-
SHA256
b25089fdac7b264b1e7aaec191455d5f41ca0564b7055e956683cc05de13ff2c
-
SHA512
70f2b4f7ea62901c3f286380456384f3d544bc35b6f2c356d4e40e44bb8a53fe28377f8175246f1f8d869d566d2802e1b26e057e9c279bc9f83e53698373c6c4
-
SSDEEP
1536:YTJIhrvYqsk9Tv36hetDFsnrRsHFiuBTiuOJjp6n1taB9GevT3:gsrvY3hetDFsnFSFsJjpg1tE7v
Malware Config
Signatures
Files
-
b25089fdac7b264b1e7aaec191455d5f41ca0564b7055e956683cc05de13ff2c.exe windows x86
8899d4f7d5a4b09066c5f522f49724e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetEvent
MoveFileA
WriteFile
CreateFileA
DeleteFileA
lstrcatA
lstrcmpA
GetTempPathA
ExpandEnvironmentStringsA
GetCurrentProcessId
CreateDirectoryA
GetLocalTime
LoadLibraryA
GetPrivateProfileStringA
WritePrivateProfileStringA
OutputDebugStringA
GetCurrentThreadId
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetCurrentProcess
GetModuleHandleA
GetProcAddress
VirtualAllocEx
WriteProcessMemory
GetVersionExA
CreateRemoteThread
ReadProcessMemory
VirtualFreeEx
GetExitCodeThread
OpenProcess
CloseHandle
GetTickCount
Sleep
SetEvent
lstrcpyA
GetModuleFileNameA
lstrlenA
CreateEventA
CreateThread
WaitForSingleObject
TerminateThread
lstrcmpiA
SetFilePointer
GetLastError
SetStdHandle
GetOEMCP
FlushFileBuffers
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
ExitProcess
TerminateProcess
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetTimeZoneInformation
GetSystemTime
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
HeapReAlloc
HeapSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
WideCharToMultiByte
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
user32
wvsprintfA
wsprintfA
advapi32
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegCloseKey
SetServiceStatus
RegisterServiceCtrlHandlerA
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateServiceA
StartServiceA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
OpenSCManagerA
ChangeServiceConfig2A
CloseServiceHandle
StartServiceCtrlDispatcherA
ws2_32
gethostbyname
inet_ntoa
WSAStartup
wininet
InternetSetOptionA
InternetReadFile
InternetOpenA
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
psapi
EnumProcesses
GetModuleFileNameExA
shell32
SHGetFileInfoA
shlwapi
SHDeleteValueA
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE