Static task
static1
Behavioral task
behavioral1
Sample
37806182800071da8712baac74c3fe2a591bb7b742423e7171936e34fafa3d2a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
37806182800071da8712baac74c3fe2a591bb7b742423e7171936e34fafa3d2a.exe
Resource
win10v2004-20220812-en
General
-
Target
37806182800071da8712baac74c3fe2a591bb7b742423e7171936e34fafa3d2a
-
Size
79KB
-
MD5
49a38fb34439a05163749abd5bba0160
-
SHA1
67217d6fb5b18f0a4c5f0e9dc82896f61d56df35
-
SHA256
37806182800071da8712baac74c3fe2a591bb7b742423e7171936e34fafa3d2a
-
SHA512
549a05563fddfdd22089d54049c7de1ea7fb835916504bcae6f2e804bfbb6664471730b1310ae6ad96100b3bc36055f969e5669473f3f8b99ebe745d709568d1
-
SSDEEP
1536:5GA9qAzEnBSrfOnszsePRyHzPIVIA0npHNV9dva+fu5CBget2:3EBSbOn+/pyTrhHlayuQBget2
Malware Config
Signatures
Files
-
37806182800071da8712baac74c3fe2a591bb7b742423e7171936e34fafa3d2a.exe windows x86
14ce486cab816da50b6ea4ee9e7cd88b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GlobalUnlock
GlobalLock
GlobalSize
GetCommandLineW
GetFileAttributesExW
GetLastError
GetUserDefaultLCID
GetTimeZoneInformation
CreateDirectoryW
GetTempPathW
WaitForMultipleObjects
GetCurrentThread
SetEnvironmentVariableW
GetEnvironmentVariableW
MultiByteToWideChar
WideCharToMultiByte
WriteFile
SetFilePointer
CreateFileW
lstrlenA
MoveFileExW
ReadFile
GetFileInformationByHandle
DuplicateHandle
GetCurrentProcess
SetFileAttributesW
DeleteFileW
GetModuleHandleA
GetStartupInfoW
RaiseException
LoadLibraryA
LocalAlloc
GetSystemTime
InterlockedExchange
CreateEventW
GetCurrentThreadId
Sleep
CreateThread
ReleaseMutex
ResetEvent
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
SetLastError
lstrcmpiA
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
lstrlenW
CloseHandle
lstrcpyW
lstrcatW
GetModuleFileNameW
LoadLibraryW
FreeLibrary
WaitForSingleObject
SetEvent
GetProcAddress
GetWindowsDirectoryA
CreateFileA
lstrcatA
VirtualAlloc
user32
LoadStringW
PostThreadMessageW
CharNextW
DispatchMessageW
GetMessageW
MsgWaitForMultipleObjects
TranslateMessage
PeekMessageW
LoadCursorW
RegisterClassExA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
DispatchMessageA
GetSysColor
PostQuitMessage
DefWindowProcA
gdi32
GetStockObject
DeleteEnhMetaFile
msvcrt
wcschr
_beginthreadex
_wcsnicmp
swprintf
wcsncat
swscanf
_wcsdup
wcscpy
memmove
_ftol
wcslen
_CxxThrowException
malloc
free
_purecall
_wcsicmp
__dllonexit
_onexit
_controlfp
_except_handler3
wcscmp
_exit
_c_exit
__CxxFrameHandler
_XcptFilter
_cexit
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
iswspace
__set_app_type
wcscat
advapi32
RegSetValueExW
RegConnectRegistryW
RegOpenKeyExW
RegCloseKey
OpenThreadToken
RegisterEventSourceW
DeregisterEventSource
SetThreadToken
ole32
CoGetCallContext
CLSIDFromString
CoTaskMemAlloc
CoCreateInstance
CoSuspendClassObjects
CoRevokeClassObject
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoRegisterClassObject
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ