Static task
static1
Behavioral task
behavioral1
Sample
519f77b1818a91be83a04e91ee87ee8cff0f3b195450f302be1a9cc9628f2475.exe
Resource
win7-20220901-en
General
-
Target
519f77b1818a91be83a04e91ee87ee8cff0f3b195450f302be1a9cc9628f2475
-
Size
679KB
-
MD5
a04aec1946051c2e4cc1c6087aed6e8d
-
SHA1
5590c945d8ecf372aac0b73c0d8f6df6251078b8
-
SHA256
519f77b1818a91be83a04e91ee87ee8cff0f3b195450f302be1a9cc9628f2475
-
SHA512
db2490b82cdf8dd4d036f9207a18efc671aeef2e82bd00bc4c4ef61c8a8d9bbd480aa7bcb0e11d5b3958f44b62fdb256dbe3200cf152d7f854ddddd2fe0b43de
-
SSDEEP
12288:/eUtud6s4ycatw7EpRQ2mLPwUp/okFo42XcSBERSzTia:HWwodmJ/fFo4NSBERS/
Malware Config
Signatures
Files
-
519f77b1818a91be83a04e91ee87ee8cff0f3b195450f302be1a9cc9628f2475.exe windows x86
7eff95036c1770fe524b643153f19608
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CreateFileA
FindResourceA
SetFilePointer
LoadResource
ExpandEnvironmentStringsA
WriteFile
SizeofResource
ReadFile
LockResource
GetModuleFileNameA
CloseHandle
GetExitCodeThread
CreateThread
lstrcpyA
MultiByteToWideChar
Sleep
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
GetStartupInfoW
HeapSetInformation
InterlockedExchange
InterlockedCompareExchange
user32
GetMessageA
LoadIconA
CharUpperA
TranslateMessage
DefWindowProcA
DispatchMessageA
MessageBoxW
LoadCursorA
RegisterClassA
SendMessageA
CreateWindowExA
shell32
ShellExecuteA
msvcr100
??2@YAPAXI@Z
isspace
strrchr
strncpy
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_invoke_watson
_controlfp_s
??3@YAXPAX@Z
memset
exit
memcpy
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 666KB - Virtual size: 666KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ