Static task
static1
Behavioral task
behavioral1
Sample
612b6e90e6115eeba41685b0640e7652774103096a38302fbdf48507d8400488.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
612b6e90e6115eeba41685b0640e7652774103096a38302fbdf48507d8400488.exe
Resource
win10v2004-20220812-en
General
-
Target
612b6e90e6115eeba41685b0640e7652774103096a38302fbdf48507d8400488
-
Size
103KB
-
MD5
807c230dff6677c6015a9e0422890313
-
SHA1
30678c42e56398bec3a0de3aea7dc29136cfe1d4
-
SHA256
612b6e90e6115eeba41685b0640e7652774103096a38302fbdf48507d8400488
-
SHA512
4ddca7cbc424d832e31508d5c327ec2b195b70d90e9f38eee16ce569076ec7e7bf69ea8e0101fabe152c99cf4eb8d33cbf803301d61857d71435848ec5b85f9f
-
SSDEEP
1536:j+jAbZEtCnG95dD1xnUa0V61MpuDR+wc8PY0cxiPvITlVyApaf0:lZE9DrUa0E1BR+wc8wtxzJ0c
Malware Config
Signatures
Files
-
612b6e90e6115eeba41685b0640e7652774103096a38302fbdf48507d8400488.exe windows x86
9e980dc0abfdd7923924f4c16a7b2cd4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrlenA
GetEnvironmentVariableA
GetDateFormatA
CompareStringW
UnhandledExceptionFilter
IsBadWritePtr
GetUserDefaultLangID
FreeEnvironmentStringsW
GetLocaleInfoA
CopyFileW
GetACP
lstrcmpiW
GetModuleHandleW
InterlockedDecrement
GetCommandLineW
DeleteFileA
FreeEnvironmentStringsA
lstrlenW
IsDebuggerPresent
WritePrivateProfileStringA
GetEnvironmentStrings
GetExitCodeProcess
GetDriveTypeA
LCMapStringA
GetCurrentProcess
GetStartupInfoA
CompareFileTime
GetVersion
WriteConsoleA
LocalAlloc
EnumCalendarInfoA
VirtualProtect
WaitForSingleObject
LoadResource
GetModuleHandleA
GetFileTime
lstrcmpiA
GetThreadLocale
GetTempPathA
ExpandEnvironmentStringsA
ExitProcess
VirtualFree
msvcrt
__p__commode
__set_app_type
_initterm
__setusermatherr
_except_handler3
_adjust_fdiv
_controlfp
__p___initenv
_XcptFilter
__getmainargs
_exit
__p__fmode
user32
LoadBitmapA
SetMenu
IsWindowVisible
ScrollWindow
GetCursorPos
TranslateMessage
CharNextA
PostMessageA
GetDCEx
LoadCursorA
OffsetRect
DestroyMenu
SetCursor
DefWindowProcA
GetMenuState
GetWindowTextA
CreatePopupMenu
EndPaint
GetWindowLongA
GetMenuItemCount
SetForegroundWindow
GetWindowPlacement
SetWindowsHookExA
PtInRect
RegisterClipboardFormatA
KillTimer
GetClientRect
DrawIconEx
SetFocus
GetScrollInfo
GetKeyState
RemovePropA
DialogBoxParamA
EnableMenuItem
MessageBoxA
EnumWindows
ReleaseDC
PeekMessageA
GetTopWindow
DrawIcon
CharLowerA
ClientToScreen
advapi32
RegCreateKeyA
GetSecurityDescriptorDacl
CryptCreateHash
RegDeleteValueA
CloseServiceHandle
LookupPrivilegeValueA
RegEnumValueW
InitializeSecurityDescriptor
RegCreateKeyExA
OpenServiceW
CheckTokenMembership
RegCreateKeyExW
RegQueryValueExW
RegQueryValueExA
CopySid
RegDeleteKeyA
OpenSCManagerW
GetUserNameA
LookupPrivilegeValueW
OpenSCManagerA
InitiateSystemShutdownA
RegOpenKeyW
RegEnumKeyExW
CryptDestroyHash
OpenProcessToken
RegOpenKeyA
RegQueryValueA
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
Sections
.text Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ