Static task
static1
Behavioral task
behavioral1
Sample
570940f4278cc0393929aea53836fc8268acbda15e10f236ed9102355bbf3d4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
570940f4278cc0393929aea53836fc8268acbda15e10f236ed9102355bbf3d4b.exe
Resource
win10v2004-20220812-en
General
-
Target
570940f4278cc0393929aea53836fc8268acbda15e10f236ed9102355bbf3d4b
-
Size
178KB
-
MD5
9333f317162b594a4b30d57419721412
-
SHA1
38e9f7ca312abf6b5f58484d70044ad34ad338f3
-
SHA256
570940f4278cc0393929aea53836fc8268acbda15e10f236ed9102355bbf3d4b
-
SHA512
e7432afb9a004ba68f67586a27663b28917fa877022e699e38c141854e2b8d57bae489670a96fe805caa0a16c46e6fe9b6a03b637a109a3938f8884713a6674e
-
SSDEEP
3072:t+vRdytbRi5gT2a5zPB5ON7HIJlIaiYG83YvYbELfX8ZmdbhxvIUreYV:6Rdiila5T4UIpzvHf8Zmdb/InYV
Malware Config
Signatures
Files
-
570940f4278cc0393929aea53836fc8268acbda15e10f236ed9102355bbf3d4b.exe windows x86
776936c154d35c96a366bb33f4284717
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
CreateDirectoryA
GetCurrentProcess
GetModuleFileNameA
MultiByteToWideChar
GetVersionExA
FindResourceA
FreeLibrary
ExpandEnvironmentStringsA
LoadLibraryA
LoadLibraryExA
CompareStringA
WideCharToMultiByte
IsDBCSLeadByte
GetCPInfo
GetCurrentDirectoryA
CopyFileA
GetEnvironmentVariableA
CreateProcessA
GetTempPathA
WritePrivateProfileStringA
GetShortPathNameA
GetWindowsDirectoryA
MoveFileExA
RemoveDirectoryA
SetCurrentDirectoryA
Sleep
DeleteFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
InitializeCriticalSectionAndSpinCount
GetVersion
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ExitProcess
MoveFileA
SetFileAttributesA
GetFileAttributesW
GetFileAttributesA
GetModuleHandleA
GetProcAddress
WriteFile
SetLastError
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetEndOfFile
SetFilePointer
GetLastError
FlushFileBuffers
GetProcessHeap
CloseHandle
GetModuleHandleW
HeapCreate
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
HeapReAlloc
LeaveCriticalSection
RaiseException
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
SetStdHandle
EnterCriticalSection
user32
GetDlgItem
EnableWindow
ReleaseDC
LoadIconA
MessageBoxA
SetForegroundWindow
GetSysColor
SendDlgItemMessageA
SetDlgItemTextA
GetDC
LoadStringA
GetWindowRect
GetClientRect
SetWindowPos
GetWindowTextA
SetWindowTextA
GetSystemMetrics
GetWindow
GetClassNameA
GetWindowLongA
SetWindowLongA
DialogBoxParamA
EndDialog
CheckDlgButton
IsDlgButtonChecked
GetParent
SendMessageA
InvalidateRect
gdi32
CreateFontA
DeleteObject
GetDeviceCaps
advapi32
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHChangeNotify
SHFileOperationA
ole32
OleUninitialize
OleInitialize
CoCreateInstance
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.lrdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE