Static task
static1
Behavioral task
behavioral1
Sample
1a01c50b6d672cc0d7c4f3b0ba17cb58655c19759063aa1195d61c9b5a9fa4c6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1a01c50b6d672cc0d7c4f3b0ba17cb58655c19759063aa1195d61c9b5a9fa4c6.exe
Resource
win10v2004-20220901-en
General
-
Target
1a01c50b6d672cc0d7c4f3b0ba17cb58655c19759063aa1195d61c9b5a9fa4c6
-
Size
464KB
-
MD5
a04b823e58161dea1c6efd468a74ee9c
-
SHA1
4eaef6671782caf600651eea97340fcfda647c65
-
SHA256
1a01c50b6d672cc0d7c4f3b0ba17cb58655c19759063aa1195d61c9b5a9fa4c6
-
SHA512
adc4a65d10ba7bbd74aaf5a99e987538dc54d4632f17c74bc1c8136be241a09da59dfb6a3c2e1c8bfaee392ecdc1f9b7a1db39a8cddfa784b0a26b908107d59b
-
SSDEEP
6144:55bELf/Ml/cWdi5pV/JNWOVhMPEGvVQBJm/O4pJzAlQ+sW2sbn:/dOpNX1hTmVn/O4pJUlKy
Malware Config
Signatures
Files
-
1a01c50b6d672cc0d7c4f3b0ba17cb58655c19759063aa1195d61c9b5a9fa4c6.exe windows x86
2baaf528b15a3635e2f26bdcfa93a46d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
VirtualQuery
UnmapViewOfFile
CopyFileW
GetLastError
SetFileAttributesW
DeleteFileW
WriteFile
CreateDirectoryW
GetCurrentProcess
GetSystemDirectoryW
FindFirstVolumeW
GetVolumePathNamesForVolumeNameW
GetDriveTypeW
FindNextVolumeW
FindVolumeClose
Sleep
SetPriorityClass
SetErrorMode
CreateMutexW
WaitForSingleObject
CreateThread
CreateFileMappingW
GetComputerNameW
GetSystemTime
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
Module32FirstW
ReleaseMutex
GlobalAlloc
FindFirstFileW
FindNextFileW
GetFileAttributesW
ExitProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
CloseHandle
HeapFree
GetFileSize
HeapCreate
CreateFileW
GetModuleFileNameW
ReadFile
SetFilePointer
HeapAlloc
ResumeThread
UnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
user32
GetKeyState
GetKeyNameTextW
CharLowerW
GetAsyncKeyState
MapVirtualKeyW
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
LookupPrivilegeValueW
SetKernelObjectSecurity
AdjustTokenPrivileges
OpenProcessToken
shell32
ShellExecuteW
msvcr80
__p__fmode
wcscpy_s
wcscat_s
_vsnwprintf_s
rand_s
_wfopen
perror
fwprintf
fflush
_wcsicmp
malloc
free
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
memset
_encode_pointer
__set_app_type
_crt_debugger_hook
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wqpegrf Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tbgdwzo Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idjwslj Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pafkcyr Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zmukgos Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE