Static task
static1
Behavioral task
behavioral1
Sample
b08e198a1e5528ab3250a3024e75d6546e79695768fd78d94a20450247d19f01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b08e198a1e5528ab3250a3024e75d6546e79695768fd78d94a20450247d19f01.exe
Resource
win10v2004-20220901-en
General
-
Target
b08e198a1e5528ab3250a3024e75d6546e79695768fd78d94a20450247d19f01
-
Size
136KB
-
MD5
80e4d8b7737999bd927d87282cdb2455
-
SHA1
0cd2f503ff244fd4d957d21eba8eded0b28fcee8
-
SHA256
b08e198a1e5528ab3250a3024e75d6546e79695768fd78d94a20450247d19f01
-
SHA512
e96493179911184931a8892f08edd21889b016b54b8871105faa8adc1f759c08ee19e72c10ac290f273125da1cff65eab3a2b292d9e33e5f56f73c0a8b9f1ce7
-
SSDEEP
1536:jDB+DkDjl8fO1Qkzx3ToFuJL0tC0NH7no47MYTK4iKEFXvxKqHs:fB+DkDZs5kZToTtCiH7nN70/Xey
Malware Config
Signatures
Files
-
b08e198a1e5528ab3250a3024e75d6546e79695768fd78d94a20450247d19f01.exe windows x86
5d4c6eca8b3cf18f226522903760f05b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
MapViewOfFile
CreateFileMappingA
CloseHandle
GetFileSize
CreateFileA
SetFileAttributesW
MultiByteToWideChar
lstrlenA
CopyFileA
DeleteFileA
GetFileTime
FindNextFileA
SetFileAttributesA
lstrcpynA
GetDiskFreeSpaceA
GetProcAddress
GetModuleHandleA
ReleaseMutex
WaitForSingleObject
lstrcmpiA
CreateDirectoryA
GetCurrentProcess
FormatMessageA
GetLastError
GetTempPathA
Sleep
CreateProcessA
GetSystemDirectoryA
UnmapViewOfFile
SetErrorMode
SetCurrentDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
SetFileTime
SystemTimeToFileTime
lstrcmpA
GetVersion
CreateThread
CreateMutexA
CreateSemaphoreA
VirtualFree
VirtualAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
GetDriveTypeA
GetLogicalDriveStringsA
ReleaseSemaphore
OpenSemaphoreA
GetComputerNameA
GetShortPathNameA
CompareStringW
CompareStringA
GetStringTypeW
SetEnvironmentVariableA
GetStringTypeA
FindFirstFileA
FindClose
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetSystemTime
ExitProcess
WinExec
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
FlushFileBuffers
SetStdHandle
GetTimeZoneInformation
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
HeapAlloc
GetFileAttributesA
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
HeapFree
HeapReAlloc
TerminateProcess
WideCharToMultiByte
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
user32
DialogBoxParamA
wsprintfA
ShowWindow
EndDialog
PostQuitMessage
advapi32
RegSetValueExA
RegCloseKey
RegRestoreKeyA
RegOpenKeyExA
RegSaveKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExA
shell32
ShellExecuteA
ole32
CoInitialize
CoUninitialize
shlwapi
PathQuoteSpacesA
ws2_32
WSACleanup
inet_addr
gethostbyname
WSAStartup
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hzlmfty Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE