Static task
static1
Behavioral task
behavioral1
Sample
f6725794c115a68cdd355e96564744acd86d5d5cddae9fbdfaa50b10b2c9b28e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f6725794c115a68cdd355e96564744acd86d5d5cddae9fbdfaa50b10b2c9b28e.exe
Resource
win10v2004-20220812-en
General
-
Target
f6725794c115a68cdd355e96564744acd86d5d5cddae9fbdfaa50b10b2c9b28e
-
Size
260KB
-
MD5
9626897ece080b00a6d3450649986d20
-
SHA1
0ba48f05cd8062df0348a1dfe496d06a2178dc68
-
SHA256
f6725794c115a68cdd355e96564744acd86d5d5cddae9fbdfaa50b10b2c9b28e
-
SHA512
63e350e83e445066e0d292d4aba7664d5e64de3fc922bcacb3a4f141cf249ac94d461c2c5ad5089417d0b2e3a9771ad377665a50b6227b6e9455db28a290fe9a
-
SSDEEP
6144:fug6zxgTjxIrnboYlepRt0+MRtaPFcU3FFnJEz/5tBRf:fWo6boYlgpMRtsF/3FEN1f
Malware Config
Signatures
Files
-
f6725794c115a68cdd355e96564744acd86d5d5cddae9fbdfaa50b10b2c9b28e.exe windows x86
c2c0bca1aaf250424dac73d5e024a40f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
fclose
printf
wcslen
fprintf
_strnicmp
rand
strncpy
_splitpath
strncmp
_strupr
_fullpath
vprintf
isprint
_iob
memmove
_stricmp
fflush
_itoa
toupper
sprintf
fopen
_makepath
kernel32
SetThreadPriority
GlobalAlloc
GetSystemDefaultLangID
SetEvent
InterlockedIncrement
HeapCreate
CompareStringW
FindFirstFileA
GetEnvironmentStringsA
GetFileAttributesA
VirtualFree
WriteFile
SetFilePointer
QueryPerformanceCounter
SetEndOfFile
WaitForSingleObject
GetLastError
CloseHandle
CreateThread
GetExitCodeThread
LoadLibraryW
CreateDirectoryA
GetTickCount
MapViewOfFile
GetSystemInfo
OpenEventA
FindClose
OpenSemaphoreA
FindNextFileA
GetProcAddress
lstrlenA
GetDiskFreeSpaceA
GetUserDefaultLangID
OutputDebugStringA
LeaveCriticalSection
GetOEMCP
OpenMutexA
LCMapStringW
InterlockedDecrement
GetEnvironmentStringsW
CreateSemaphoreA
GlobalFree
OpenFileMappingA
GlobalFindAtomW
CreateMutexA
GetCPInfo
GetModuleFileNameA
GetFileSize
WaitForMultipleObjects
SetLastError
ResetEvent
EnterCriticalSection
UnmapViewOfFile
GetUserDefaultLCID
GetCurrentProcessId
lstrcpyA
ReadFile
lstrcmpA
CreateEventA
GetModuleHandleW
WriteFileEx
ReleaseSemaphore
CreateFileA
RemoveDirectoryA
FreeLibrary
ReleaseMutex
ExpandEnvironmentStringsA
ReadFileEx
WaitForSingleObjectEx
DeleteCriticalSection
advapi32
RegSetValueExA
GetLengthSid
DeregisterEventSource
AllocateAndInitializeSid
RegisterEventSourceA
RegDeleteKeyA
RegOpenKeyExA
FreeSid
RegDeleteValueA
ReportEventA
RegCreateKeyExA
RegQueryValueExA
InitializeAcl
RegCloseKey
SetSecurityDescriptorDacl
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ