Static task
static1
Behavioral task
behavioral1
Sample
733ce826dc8d683b22598fe88bb983d150346206f86815c5e72e572564103fdb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
733ce826dc8d683b22598fe88bb983d150346206f86815c5e72e572564103fdb.exe
Resource
win10v2004-20220901-en
General
-
Target
733ce826dc8d683b22598fe88bb983d150346206f86815c5e72e572564103fdb
-
Size
331KB
-
MD5
a019e8a540f9d31aea20f7a920a06041
-
SHA1
2f27324b5b135f63aaf5117faf9bb43349a2d34a
-
SHA256
733ce826dc8d683b22598fe88bb983d150346206f86815c5e72e572564103fdb
-
SHA512
af9f9604a04b54de1089ad48d40606de06fe7e1ad495bc92511705911d1598b737ef91db5d0de290f778a56f8b29f981849a18bfb848628df8541804c644d8e0
-
SSDEEP
6144:/6uYMbnBCYzyYawHyOAl1ET7XlOBfWRyDBEMmSTd54/1Q61dgCW:/hhVywjUfeyDiMmEiVA
Malware Config
Signatures
Files
-
733ce826dc8d683b22598fe88bb983d150346206f86815c5e72e572564103fdb.exe windows x86
98ff96b84fcfc19dbeb344b1b2b73f6c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetKeyNameTextA
GetClassInfoExA
CallWindowProcA
GetFocus
SetCursor
GetMessageA
SetFocus
GetWindowTextLengthA
GetCursorPos
GetDlgItemInt
GetScrollRange
SetDlgItemInt
InsertMenuItemA
AppendMenuA
RegisterClassExA
advapi32
QueryServiceStatus
LookupPrivilegeValueA
FreeSid
SetSecurityDescriptorDacl
SetEntriesInAclA
OpenThreadToken
OpenSCManagerA
StartServiceCtrlDispatcherA
InitializeSecurityDescriptor
OpenProcessToken
RegDeleteKeyA
OpenServiceA
RegCloseKey
SetServiceStatus
RegQueryValueExA
AllocateAndInitializeSid
RegCreateKeyExA
ControlService
RegOpenKeyExA
RegEnumKeyA
RegSetValueExA
RegisterServiceCtrlHandlerA
CreateServiceW
kernel32
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
VirtualProtect
VirtualFree
GetProcessHeap
CreateDirectoryA
GetSystemTimeAsFileTime
CloseHandle
FormatMessageA
VirtualAlloc
ResetEvent
DeleteFileA
SetSystemTimeAdjustment
CreateSemaphoreA
GetCPInfo
SetSystemPowerState
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapDestroy
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
GetACP
GetOEMCP
IsValidCodePage
Sleep
HeapReAlloc
RtlUnwind
HeapSize
MultiByteToWideChar
Sections
.text Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 303KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ