Static task
static1
Behavioral task
behavioral1
Sample
5337bf26672034bade63e1f06aa1718a1b3251f206302ff6370b786ff34f478d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5337bf26672034bade63e1f06aa1718a1b3251f206302ff6370b786ff34f478d.exe
Resource
win10v2004-20220812-en
General
-
Target
5337bf26672034bade63e1f06aa1718a1b3251f206302ff6370b786ff34f478d
-
Size
128KB
-
MD5
59b43f4284b053f2f8b0c3acc85d27c1
-
SHA1
8c359aa34356a64f46eebbde7a02af05d261f60b
-
SHA256
5337bf26672034bade63e1f06aa1718a1b3251f206302ff6370b786ff34f478d
-
SHA512
cc70a8bc0ba20d0022704063353f275058354c6317b0c02d79342a834058e75cddd11753c0cc3be4c869cdb09d2bd6918ec6797672551e0168701aa98d3e530b
-
SSDEEP
3072:p+KGdNEuwmJtCEE0XCuuotBiaRo2TznobR2piIxQms3jsIr+KqoeLN9:5EE0XHTznobRReQ5sXKqpD
Malware Config
Signatures
Files
-
5337bf26672034bade63e1f06aa1718a1b3251f206302ff6370b786ff34f478d.exe windows x86
a215a86b18028b6291531080ff17716e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
imagehlp
SymInitialize
SymSetOptions
SymGetModuleBase
SymFunctionTableAccess
StackWalk
SymGetModuleInfo
SymUnDName
SymCleanup
SymGetSymFromAddr
sqlunirl
_FormatMessage@28
_GetVersionEx@4
_LoadString@16
_GetProcAddress_@8
_GetUnicodeRedirectionLayer@0
atl
ord23
ord58
ord21
ord22
ord18
ord20
ord17
ord16
ord30
ord32
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
GlobalAlloc
GetModuleFileNameA
GlobalLock
GlobalUnlock
FreeLibrary
LoadLibraryA
lstrcatA
FormatMessageA
GetLastError
GetModuleHandleA
SetFilePointer
lstrcpyA
ExpandEnvironmentStringsA
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
CloseHandle
ResetEvent
SetEvent
GetSystemInfo
GlobalFree
SetErrorMode
HeapFree
FlushFileBuffers
ReadProcessMemory
WriteFile
lstrlenA
HeapAlloc
GetProcessHeap
GetCurrentProcess
GetEnvironmentVariableA
CreateFileA
QueryPerformanceFrequency
GlobalMemoryStatus
WaitForMultipleObjects
WaitForSingleObject
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
AllocConsole
GetStdHandle
GetCurrentThreadId
CreateEventA
GetCommandLineA
InterlockedIncrement
GetSystemDefaultLCID
GetSystemDefaultLangID
InterlockedDecrement
user32
wsprintfA
MessageBoxA
advapi32
RegCloseKey
RegQueryValueExA
RegSetValueExA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
MakeSelfRelativeSD
GetSecurityDescriptorLength
RegOpenKeyExA
OpenProcessToken
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ole32
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
LoadRegTypeLi
SysStringLen
SysFreeString
msvcrt
_CxxThrowException
wcschr
??3@YAXPAX@Z
wcsncpy
__getmainargs
_exit
_iob
freopen
_purecall
fclose
time
printf
_controlfp
??1type_info@@UAE@XZ
_onexit
__dllonexit
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_XcptFilter
exit
strchr
_strnicmp
_except_handler3
wcsncat
wcslen
strncpy
sprintf
_stricmp
wcscpy
localtime
asctime
__p___initenv
??2@YAPAXI@Z
_vsnwprintf
free
wprintf
malloc
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE