Static task
static1
Behavioral task
behavioral1
Sample
630d9ee399cfef7c6ddc16bf792feaf7c193abbc442c29b377260618b80054f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
630d9ee399cfef7c6ddc16bf792feaf7c193abbc442c29b377260618b80054f8.exe
Resource
win10v2004-20220812-en
General
-
Target
630d9ee399cfef7c6ddc16bf792feaf7c193abbc442c29b377260618b80054f8
-
Size
424KB
-
MD5
838dc9cbb5a9a0b090f32ef6c9c479b0
-
SHA1
51d6f0881b9a0feaa753d287d6c90833219bbcd0
-
SHA256
630d9ee399cfef7c6ddc16bf792feaf7c193abbc442c29b377260618b80054f8
-
SHA512
241be620828844fa93959ca718febfa4c7141ea44e3bfc5118ae029d0fdff58c905010443221ce6bd56d1f1dd749284736d07a1c6331a289b86bd5262d05cfa2
-
SSDEEP
6144:IYbRrCWfEt6BxHWO61SVoDhOl2D1o3xOZIVPB9ko3odqSM7l4NI2L3k+y6yec:IYbRr3fTxHW9SqV42SCIVvkRq6XjF
Malware Config
Signatures
Files
-
630d9ee399cfef7c6ddc16bf792feaf7c193abbc442c29b377260618b80054f8.exe windows x86
9168641201be3833e8b7daaa023241ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
kernel32
GetEnvironmentStrings
SetStdHandle
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
RaiseException
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCurrentDirectoryA
GetCommandLineW
GetCurrentProcessId
SizeofResource
lstrlenW
VirtualQuery
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
UnmapViewOfFile
LCMapStringW
GetLastError
InterlockedIncrement
GetCurrentThreadId
TlsSetValue
GetFileType
CreateEventA
CreateFileW
CreateEventW
GlobalLock
FindNextFileA
CreateFileMappingA
CompareStringA
lstrcpyA
FindFirstFileA
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileW
GetEnvironmentVariableA
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
GetVersionExA
VirtualProtect
TlsAlloc
GetTickCount
QueryPerformanceCounter
SetEvent
LoadLibraryW
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
GetVersion
GetLocaleInfoA
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
MultiByteToWideChar
UnhandledExceptionFilter
SetConsoleCtrlHandler
GetModuleFileNameA
CreateProcessA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
TlsGetValue
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
FormatMessageW
LocalFree
GetOEMCP
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
GetStringTypeA
GetCPInfo
FreeEnvironmentStringsW
ExitProcess
CreateFileA
LocalAlloc
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapDestroy
FindFirstFileW
WaitForSingleObject
GetFileAttributesA
GetConsoleOutputCP
GetStdHandle
GetSystemDefaultLangID
GetUserDefaultLangID
GetCurrentThread
GetSystemDefaultLCID
GetUserDefaultLCID
VirtualAlloc
Sleep
VirtualFree
HeapCreate
WideCharToMultiByte
InterlockedExchange
user32
MessageBoxA
EndDialog
SetForegroundWindow
GetDesktopWindow
LoadCursorA
ScreenToClient
GetDlgItem
CreateWindowExA
GetSubMenu
CheckMenuItem
SetWindowTextA
ReleaseCapture
SetCapture
GetSystemMetrics
MapWindowPoints
DispatchMessageA
FillRect
SetTimer
GetWindowLongA
RegisterClassA
EnableMenuItem
LoadStringA
TranslateMessage
PeekMessageA
ShowWindow
UpdateWindow
GetParent
PtInRect
SendMessageA
ReleaseDC
GetDC
EndPaint
IsWindow
SetWindowPos
DestroyWindow
SetFocus
IsWindowVisible
InvalidateRect
wsprintfA
GetClientRect
SetCursor
GetSysColor
gdi32
SetBkColor
DeleteObject
DeleteDC
GetStockObject
CreateCompatibleDC
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 361KB - Virtual size: 361KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ