Static task
static1
Behavioral task
behavioral1
Sample
0e542eb90f260062b8befe35ee4dc80e0ebbc21aad21c932caaaa56ff9646d88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e542eb90f260062b8befe35ee4dc80e0ebbc21aad21c932caaaa56ff9646d88.exe
Resource
win10v2004-20220901-en
General
-
Target
0e542eb90f260062b8befe35ee4dc80e0ebbc21aad21c932caaaa56ff9646d88
-
Size
263KB
-
MD5
4f5af79f00aaae9081b40d2873834fe0
-
SHA1
60cb3a86dcd201d6ce4d37044358f9df400c713c
-
SHA256
0e542eb90f260062b8befe35ee4dc80e0ebbc21aad21c932caaaa56ff9646d88
-
SHA512
342ce5cc7b0ffdda17e1ad87c1271d46c3c37287cc8642ca711af2e5c1cdeddf9ba652f9ddd049ddad48a444ac9ac4e60206153f8fd9bbe356cef94d9a4b9081
-
SSDEEP
6144:/oSCCdLVDNUw4kkhulPzW1/zhYKq4lpZKeLCr/MwZVcfw+U3yrc:XPtZsvh6P4zmKblpcmCQwgfwOo
Malware Config
Signatures
Files
-
0e542eb90f260062b8befe35ee4dc80e0ebbc21aad21c932caaaa56ff9646d88.exe windows x86
06afd7c0180731f6e043437ac6e6dfc5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
SetFilePointer
WaitForSingleObjectEx
LoadLibraryW
WriteFile
GetUserDefaultLCID
lstrcpyA
VirtualFree
OutputDebugStringA
ReleaseSemaphore
WaitForMultipleObjects
ResetEvent
GetModuleFileNameA
ReadFile
CreateEventA
CreateThread
InterlockedDecrement
GetOEMCP
QueryPerformanceCounter
InterlockedIncrement
GlobalFindAtomW
GlobalAlloc
HeapCreate
GetEnvironmentStringsA
FindNextFileA
OpenFileMappingA
FindClose
OpenSemaphoreA
GetSystemDefaultLangID
ReleaseMutex
WriteFileEx
GetEnvironmentStringsW
GetCurrentProcessId
CreateSemaphoreA
ExpandEnvironmentStringsA
SetEndOfFile
GetLastError
GetCPInfo
lstrcmpA
GlobalFree
DeleteCriticalSection
SetLastError
EnterCriticalSection
GetFileAttributesA
ReadFileEx
CreateDirectoryA
GetFileSize
LCMapStringW
MapViewOfFile
CreateMutexA
CompareStringW
FreeLibrary
UnmapViewOfFile
OpenEventA
GetExitCodeThread
GetSystemInfo
RemoveDirectoryA
GetModuleHandleW
OpenMutexA
FindFirstFileA
lstrlenA
CreateFileA
GetTickCount
GetUserDefaultLangID
GetProcAddress
SetThreadPriority
WaitForSingleObject
GetDiskFreeSpaceA
CloseHandle
SetEvent
msvcrt
vprintf
printf
fclose
fopen
_fullpath
strncpy
_strnicmp
_iob
_itoa
wcslen
_stricmp
fflush
sprintf
toupper
strncmp
_makepath
_splitpath
fprintf
_strupr
isprint
rand
memmove
advapi32
RegDeleteValueA
RegDeleteKeyA
AllocateAndInitializeSid
RegQueryValueExA
FreeSid
RegCloseKey
DeregisterEventSource
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegisterEventSourceA
InitializeAcl
ReportEventA
SetSecurityDescriptorDacl
GetLengthSid
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 372B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ