Static task
static1
Behavioral task
behavioral1
Sample
4529db1f9c25b202beb73124a2e4561eece2c65d630192bc67e81b400afc24bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4529db1f9c25b202beb73124a2e4561eece2c65d630192bc67e81b400afc24bb.exe
Resource
win10v2004-20220812-en
General
-
Target
4529db1f9c25b202beb73124a2e4561eece2c65d630192bc67e81b400afc24bb
-
Size
196KB
-
MD5
0ca66b928c38ffb92fa1e5f5aa3b2450
-
SHA1
5366fd12ce67cde22ed0eb00864b8e683ce2cef9
-
SHA256
4529db1f9c25b202beb73124a2e4561eece2c65d630192bc67e81b400afc24bb
-
SHA512
579e33755b647c94e7e70f6b561f075ff45a1aa3c31a9cfac486897ca2581166bfe64cb65d668598dae4b7d1759bac878e5c1abc11609c0434e99771d399e802
-
SSDEEP
3072:aM65zTN7RH9AvffSb3fpp0dL5qxpubZyejITv9fXFg1:1mTNJ0f6b3Bp0dLiobP+v9fVa
Malware Config
Signatures
Files
-
4529db1f9c25b202beb73124a2e4561eece2c65d630192bc67e81b400afc24bb.exe windows x86
559ea2d92c5991a634b8d2ac3b9a7cef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
PathQuoteSpacesA
PathUnquoteSpacesA
PathAppendA
PathRemoveArgsA
StrRChrA
kernel32
SetEvent
GetTickCount
IsBadReadPtr
ExpandEnvironmentStringsA
GetWindowsDirectoryA
WriteFile
InitializeCriticalSection
OpenProcess
FindResourceExA
WideCharToMultiByte
GetVolumeInformationA
Sleep
SizeofResource
CreateEventA
LeaveCriticalSection
GetFileAttributesA
GetExitCodeProcess
CreateProcessA
TerminateProcess
IsDBCSLeadByte
ReadFile
GetSystemDirectoryA
GetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
RaiseException
GetShortPathNameA
FindFirstFileA
GetLastError
lstrcmpiA
GetProcAddress
EnterCriticalSection
GetTempFileNameA
FindClose
LoadLibraryA
GetProcessId
CreateFileMappingA
GetExitCodeThread
WaitForSingleObject
CreateEventW
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
LoadLibraryExA
VirtualProtect
OpenEventW
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
GetVersionExA
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
lstrcpyA
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadResource
FreeLibrary
lstrcpynA
MapViewOfFile
lstrlenA
lstrcmpA
GetProcessHeap
FindResourceA
GetFileSize
CreateFileA
GetComputerNameA
ExitProcess
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
SetFilePointer
GetLocaleInfoA
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
LockResource
HeapFree
HeapAlloc
VirtualAlloc
GetModuleHandleW
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
HeapReAlloc
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStringTypeA
GetStringTypeW
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
user32
PostMessageA
GetMessageA
CharNextA
DefWindowProcA
advapi32
StartServiceA
CloseServiceHandle
RegCloseKey
GetUserNameA
QueryServiceConfigA
OpenSCManagerA
QueryServiceStatusEx
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
EnumServicesStatusExA
CreateServiceA
RegSetValueExA
GetTokenInformation
OpenProcessToken
OpenServiceA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteExA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CoTaskMemRealloc
StringFromGUID2
CoInitialize
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
Sections
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ