Static task
static1
Behavioral task
behavioral1
Sample
1cb25fb148e72360036da71bfddc7327796d7b7ab99c0de1c8734dff1af4d459.exe
Resource
win7-20220812-en
General
-
Target
1cb25fb148e72360036da71bfddc7327796d7b7ab99c0de1c8734dff1af4d459
-
Size
213KB
-
MD5
93d03fde72dba79c8ba8edc50c366bfb
-
SHA1
c11b0a5c9b385f3eb9f00c93b1a1ec36dfb8a08c
-
SHA256
1cb25fb148e72360036da71bfddc7327796d7b7ab99c0de1c8734dff1af4d459
-
SHA512
40ea8ca4eafce2eebac8939c36bfcf6e4f35280c4c3a0b190c794ad7b84fcfda66b5e52569177829c76bb80b070ab3e212ff6df5f8f85790132ef9ca77d7c6c0
-
SSDEEP
3072:qj5PYCHyo+icbSYleQ+jZqMNDBBLsADP1sxlPxjKkxiGTvFeEa8z:HYyo+icb2vDBBLsATyPhnxiGJq8z
Malware Config
Signatures
Files
-
1cb25fb148e72360036da71bfddc7327796d7b7ab99c0de1c8734dff1af4d459.exe windows x86
dfc898a76dfb153a5765c23bc688aa29
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegEnumKeyA
user32
MessageBoxA
comctl32
InitCommonControlsEx
kernel32
GetFullPathNameA
GetCurrentDirectoryA
GetModuleFileNameA
QueryPerformanceCounter
QueryPerformanceFrequency
LocalFree
FormatMessageA
GetLastError
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetCommandLineA
FreeLibrary
GetExitCodeThread
GetProcAddress
GetModuleHandleA
LoadLibraryA
FindFirstFileA
FindNextFileA
FindClose
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TerminateProcess
GetCurrentProcess
MultiByteToWideChar
ExitThread
GetCurrentThreadId
CreateThread
GetFileAttributesA
HeapAlloc
HeapReAlloc
HeapFree
GetACP
GetOEMCP
GetCPInfo
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
FlushFileBuffers
SetEnvironmentVariableA
SetEnvironmentVariableW
SetStdHandle
VirtualAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
VirtualProtect
GetSystemInfo
SetFilePointer
CompareStringA
CompareStringW
HeapSize
ReadFile
CreateFileA
GetLocaleInfoA
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
GetTimeZoneInformation
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE