Static task
static1
Behavioral task
behavioral1
Sample
907987b726a0d6f5f2b096578233163b4ccb2bffdc8b0f2aa353c800fb8aea95.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
907987b726a0d6f5f2b096578233163b4ccb2bffdc8b0f2aa353c800fb8aea95.exe
Resource
win10v2004-20220812-en
General
-
Target
907987b726a0d6f5f2b096578233163b4ccb2bffdc8b0f2aa353c800fb8aea95
-
Size
104KB
-
MD5
4e60415cc9bc631dc2431631b61ccd10
-
SHA1
084b9e9b205130a456980b51bef2bf51d7ff16f5
-
SHA256
907987b726a0d6f5f2b096578233163b4ccb2bffdc8b0f2aa353c800fb8aea95
-
SHA512
60625c5ae164e9aa6b16a8723e5bdfb2dc353d088dc7690544a8080a73b256e68a4744d887f5b9a2eeaca5f92f9a319062a0b395462086aad77c103037325226
-
SSDEEP
1536:+dx/wh333iaTA+EB5HOx6WXTuXYN1042TwjIt7tc/15kaEH3sGyl8:+Li337TA+Ehrq0mie/15kaEH87l8
Malware Config
Signatures
Files
-
907987b726a0d6f5f2b096578233163b4ccb2bffdc8b0f2aa353c800fb8aea95.exe windows x86
4ff5b2422a312c1c050266438636cf38
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHSetValueA
shell32
SHGetSpecialFolderPathA
kernel32
CreateRemoteThread
GetProcAddress
LoadLibraryA
OpenProcess
MultiByteToWideChar
lstrlenA
SetPriorityClass
FindClose
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WaitForSingleObject
GetLastError
CreateProcessA
GetModuleFileNameA
GetModuleHandleA
FindFirstFileA
HeapFree
HeapAlloc
GetProcessHeap
WriteFile
SetFilePointer
ReadFile
GetFileSize
CreateFileA
GetWindowsDirectoryA
GetVersionExA
DeleteFileA
SetFileAttributesA
GetShortPathNameA
WideCharToMultiByte
lstrlenW
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetSystemDirectoryA
GetTempPathA
SetFileAttributesW
TerminateProcess
FindNextFileA
GetFullPathNameA
GetLongPathNameA
ResumeThread
SuspendThread
GetExitCodeProcess
CloseHandle
InterlockedExchange
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
RtlUnwind
InterlockedDecrement
FreeLibrary
HeapReAlloc
RaiseException
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
HeapSize
GetFileAttributesA
SetUnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
FlushFileBuffers
Sleep
RemoveDirectoryA
InterlockedIncrement
user32
IsWindow
PostMessageA
GetWindowThreadProcessId
EnumWindows
advapi32
RegQueryValueExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegCreateKeyExA
RegEnumValueA
RegDeleteKeyA
RegEnumKeyExA
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE