Static task
static1
Behavioral task
behavioral1
Sample
74dd05b32c3e528cd37ba66a8580665e23315066fceef7b660cdf846ecc69494.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
74dd05b32c3e528cd37ba66a8580665e23315066fceef7b660cdf846ecc69494.exe
Resource
win10v2004-20220901-en
General
-
Target
74dd05b32c3e528cd37ba66a8580665e23315066fceef7b660cdf846ecc69494
-
Size
196KB
-
MD5
92271a7c376f73072dd791e047860b80
-
SHA1
6014f74aaec5a5c303dddbaa9ed03999044846c5
-
SHA256
74dd05b32c3e528cd37ba66a8580665e23315066fceef7b660cdf846ecc69494
-
SHA512
590f27a9fa364900ad34337dbeb2d3368ee651a5ed22c66d6b56beedb2134ba837e054d0d840aa0872a23912bc3f7fd121a8d06995c994f9e195b2be93bccdf7
-
SSDEEP
6144:mWC/zY3GzYzLJfv/UhF+DvH/Rmo/ToUaG:mt/2Jfv/HLH4WTo
Malware Config
Signatures
Files
-
74dd05b32c3e528cd37ba66a8580665e23315066fceef7b660cdf846ecc69494.exe windows x86
a8e468a8ffa4106d76f4d41e04d39fd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
DeleteFileA
CreateProcessA
Sleep
CloseHandle
OpenEventA
lstrlenW
GetModuleHandleA
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
GetLastError
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
CreateDirectoryA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
FlushFileBuffers
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FindResourceA
InterlockedExchange
ExitProcess
RtlUnwind
GetFileType
CreateFileA
HeapFree
HeapAlloc
ReadFile
WriteFile
SetFilePointer
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetStartupInfoA
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetHandleCount
GetStdHandle
SetStdHandle
SetEndOfFile
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapDestroy
HeapCreate
VirtualFree
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
LoadLibraryA
GetOEMCP
GetCPInfo
user32
DestroyWindow
DefWindowProcA
CharNextA
advapi32
RegCloseKey
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
ole32
CoTaskMemRealloc
CoInitialize
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�A Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE