Static task
static1
Behavioral task
behavioral1
Sample
54019cff65202191ed05f6e37f9c188bc95992ab533ca6ef1c2362361a3c676c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54019cff65202191ed05f6e37f9c188bc95992ab533ca6ef1c2362361a3c676c.exe
Resource
win10v2004-20220812-en
General
-
Target
54019cff65202191ed05f6e37f9c188bc95992ab533ca6ef1c2362361a3c676c
-
Size
839KB
-
MD5
4cc76e6981996056dc5b3822548525d1
-
SHA1
9b428d0eecb86eea96b0f81c8622e34a9cafda70
-
SHA256
54019cff65202191ed05f6e37f9c188bc95992ab533ca6ef1c2362361a3c676c
-
SHA512
32e55f50eaa0f84abd13ee618c4d60aac1941eee20b0230e62c61317043c933b54901178fd0a110f750a3b7029b1ccdb74e5d6df375970764447b0f1f4a85333
-
SSDEEP
6144:MrwKg2Vc74vh8Kjuhu+r6rYfezLXy6WhsSl00l344TYb9JTM:MrwKg2i74vGhhu+gYmHXy67SK02siC
Malware Config
Signatures
Files
-
54019cff65202191ed05f6e37f9c188bc95992ab533ca6ef1c2362361a3c676c.exe windows x86
3bac608d396151cfff6b538309bebcea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueA
CryptSetProviderW
kernel32
CloseHandle
CreateEventW
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryW
SetEvent
SetUnhandledExceptionFilter
TerminateProcess
WaitForSingleObject
AllocateUserPhysicalPages
DisableThreadLibraryCalls
FindNextVolumeMountPointA
GetDiskFreeSpaceExA
LocalAlloc
LocalFree
MultiByteToWideChar
ReadFile
SetThreadPriority
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAlloc
GetConsoleCP
ReadConsoleInputA
GetLastError
ReadConsoleInputW
SetConsoleMode
GetConsoleMode
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
PeekConsoleInputA
GetNumberOfConsoleInputEvents
CreateFileA
WideCharToMultiByte
GetConsoleOutputCP
WriteConsoleW
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapFree
HeapAlloc
VirtualProtect
GetSystemInfo
VirtualQuery
LCMapStringA
LCMapStringW
SetLastError
GetCurrentThreadId
GetCurrentThread
SetStdHandle
GetFileType
WriteFile
SetHandleCount
GetStdHandle
GetFileAttributesA
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteConsoleA
InitializeCriticalSection
RtlUnwind
InterlockedExchange
HeapReAlloc
IsBadWritePtr
GetLocaleInfoA
GetCPInfo
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
SetFilePointer
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetExitCodeProcess
CreateProcessA
HeapSize
LoadLibraryA
RaiseException
CompareStringA
CompareStringW
GetLocaleInfoW
FlushFileBuffers
SetConsoleCtrlHandler
oleaut32
OleCreatePropertyFrameIndirect
SafeArrayDestroyDescriptor
VARIANT_UserSize
VarMul
LPSAFEARRAY_Marshal
shell32
SHPathPrepareForWriteW
SHQueryRecycleBinA
user32
DrawCaption
DrawStateA
GetCaretPos
GetWindowTextW
UnregisterClassW
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 724KB - Virtual size: 723KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE