Static task
static1
Behavioral task
behavioral1
Sample
76f1ac117b1e73234e3c24968489dc0fd8bc3eb521927fffef91a9d190831cf0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76f1ac117b1e73234e3c24968489dc0fd8bc3eb521927fffef91a9d190831cf0.exe
Resource
win10v2004-20220812-en
General
-
Target
76f1ac117b1e73234e3c24968489dc0fd8bc3eb521927fffef91a9d190831cf0
-
Size
365KB
-
MD5
0c2b57e1e356e568b4874eec01a72851
-
SHA1
f76bfa575fe473df740cddd6418e18295bd123d9
-
SHA256
76f1ac117b1e73234e3c24968489dc0fd8bc3eb521927fffef91a9d190831cf0
-
SHA512
290f7776f08593817c3ff6b392fbe36a98d1bf1a6cbc07c140a833606e5b0750e53ca3881309618fd8a07706ee3f9c07ecc9f016260ddd3b2f72e2acc01440e0
-
SSDEEP
3072:o3W8YzCmeb+JiTDx/5UtQT9+GsJjhs/s5hGiJk6lurN/Kp8/YD:4yEdKQ53s+/SrH468/YD
Malware Config
Signatures
Files
-
76f1ac117b1e73234e3c24968489dc0fd8bc3eb521927fffef91a9d190831cf0.exe windows x86
e0c0c392d5e52c205ce0838d7e359b0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterClassA
DestroyWindow
KillTimer
PostQuitMessage
SetTimer
DefWindowProcA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
kernel32
GetTimeZoneInformation
IsValidLocale
EnumSystemLocalesA
CompareStringA
GetDateFormatA
GetTimeFormatA
GetStringTypeW
CompareStringW
SetEnvironmentVariableA
GetUserDefaultLCID
TlsAlloc
WideCharToMultiByte
Sleep
CloseHandle
GetProcAddress
LoadLibraryA
FreeLibrary
GetTickCount
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
InterlockedExchange
GetVersion
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoW
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 252KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE