Static task
static1
Behavioral task
behavioral1
Sample
886c6e685a787ef52ffef94f6bbfa0434562ee853faf5ebe400366dfee727d93.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
886c6e685a787ef52ffef94f6bbfa0434562ee853faf5ebe400366dfee727d93.exe
Resource
win10v2004-20220812-en
General
-
Target
886c6e685a787ef52ffef94f6bbfa0434562ee853faf5ebe400366dfee727d93
-
Size
624KB
-
MD5
7098fe386e527dcc68237cf85a65b072
-
SHA1
b03e470456cfdfd43e61a09757b231680739cffe
-
SHA256
886c6e685a787ef52ffef94f6bbfa0434562ee853faf5ebe400366dfee727d93
-
SHA512
8f34522b29dd6f2f40ac50ad5dbcb12d77b363c44d89d25a3cbcfd44fc11357fd8043cc9d3c1517f8ba65f369fbdccc97177cfa8517031943cc9f2c2087c7b6f
-
SSDEEP
12288:lLIX+a/DOH4nygosQp3bP2yeM8Hv9BT9vU7zhnCA1SxfbD+vC7SdkhHf9ECs:lkX+wnyg43z2yP8P9nyN70xfbD+vC7VE
Malware Config
Signatures
Files
-
886c6e685a787ef52ffef94f6bbfa0434562ee853faf5ebe400366dfee727d93.exe windows x86
b0432388762b4ccd6a6ac8208c65e53d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetModuleHandleA
GetCurrentThread
ExitProcess
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualFree
UnmapViewOfFile
SizeofResource
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetEnvironmentStrings
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GetConsoleCP
lstrlenA
GetSystemInfo
HeapCreate
InterlockedIncrement
CreateFileA
TlsSetValue
GetFileType
CreateEventA
Sleep
GetProcAddress
DuplicateHandle
FindNextFileA
CompareStringA
lstrcpyA
FindNextFileW
lstrcmpA
CreateProcessA
CompareStringW
GlobalLock
DeleteFileW
SetEvent
GetStartupInfoW
DeleteFileA
LCMapStringW
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
TlsAlloc
IsBadWritePtr
GetCommandLineA
FreeLibrary
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
SetUnhandledExceptionFilter
CreateThread
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
LoadLibraryExA
GetModuleFileNameA
GetVersionExA
IsDebuggerPresent
VirtualProtect
GetModuleFileNameW
InitializeCriticalSection
SetLastError
OutputDebugStringA
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
GetEnvironmentVariableA
FormatMessageW
LocalFree
GetOEMCP
SetFileAttributesA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
LoadLibraryW
GetCPInfo
SetStdHandle
FreeEnvironmentStringsW
SetErrorMode
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetLocalTime
GetFileAttributesW
HeapDestroy
WaitForSingleObject
GetFileAttributesA
GetConsoleOutputCP
GetStdHandle
GetTickCount
GetCurrentProcessId
GetVersion
QueryPerformanceCounter
GetLastError
advapi32
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
user32
GetFocus
GetClientRect
DrawTextA
wsprintfA
IsWindowVisible
GetSysColor
MessageBoxA
MessageBeep
ReleaseDC
GetDesktopWindow
SendMessageA
LoadIconA
LoadCursorA
ClientToScreen
GetDlgItem
CreateWindowExA
GetWindowLongA
CheckMenuItem
EndDialog
ReleaseCapture
GetWindowRect
DefWindowProcA
KillTimer
BeginPaint
SetFocus
EndPaint
FillRect
SetTimer
GetSubMenu
RegisterClassA
EnableMenuItem
TranslateMessage
SetWindowPos
EnableWindow
ShowWindow
UpdateWindow
GetParent
GetMessageA
DestroyWindow
ScreenToClient
GetCursorPos
GetDC
MoveWindow
SetForegroundWindow
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
Sections
.text Size: 580KB - Virtual size: 906KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ