Static task
static1
Behavioral task
behavioral1
Sample
610e0093af1ac93dd8e2362590cb6e74079be6f2d3bc0b1324699aedc0c288fd.exe
Resource
win7-20220812-en
General
-
Target
610e0093af1ac93dd8e2362590cb6e74079be6f2d3bc0b1324699aedc0c288fd
-
Size
255KB
-
MD5
915925b59b2943e266286993e7b264c0
-
SHA1
baf94214808b5270ce54f658d5fa3273503f09f8
-
SHA256
610e0093af1ac93dd8e2362590cb6e74079be6f2d3bc0b1324699aedc0c288fd
-
SHA512
3e9c7e238e28b62f6c49bb0aebfe3062be783eac8a12858e328721b77cf48959e57bff0c9b80e9e3461bd49a8bf9dc29fba4a91369c05eebd558d30c74d6df78
-
SSDEEP
6144:VuISXOr4qxlGltTELMToQwlH797Or11WRel8+51:VYXOr4qxlGoLMT1rXAE1
Malware Config
Signatures
Files
-
610e0093af1ac93dd8e2362590cb6e74079be6f2d3bc0b1324699aedc0c288fd.exe windows x86
696c5ea20caa6676ff8def4617cb98d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocString
SysAllocStringByteLen
VariantClear
VariantCopy
SysStringByteLen
SysFreeString
user32
CharUpperA
CharUpperW
CharNextA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExW
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
memset
memcpy
fputc
fflush
fgetc
fclose
_iob
free
malloc
memmove
memcmp
strlen
fputs
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
GetProcessTimes
VirtualAlloc
MapViewOfFile
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
OpenEventA
OpenFileMappingA
LoadLibraryW
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
FindNextFileA
FindNextFileW
FindFirstFileA
FindFirstFileW
FindClose
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
GetTempPathA
GetTempPathW
GetCurrentDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
SetConsoleMode
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExW
LoadLibraryExA
SetCurrentDirectoryW
LoadLibraryA
GetModuleFileNameW
GetModuleFileNameA
LocalFree
FormatMessageW
FormatMessageA
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesW
SetFileAttributesA
RemoveDirectoryW
RemoveDirectoryA
MoveFileW
MoveFileA
CreateDirectoryW
CreateDirectoryA
DeleteFileW
DeleteFileA
GetFullPathNameW
GetFullPathNameA
UnmapViewOfFile
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE