Static task
static1
Behavioral task
behavioral1
Sample
43200d3e1d862c8e24c83ee6d649ea1dcc314eba5cd765bbeb4bae60c5ca1cea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43200d3e1d862c8e24c83ee6d649ea1dcc314eba5cd765bbeb4bae60c5ca1cea.exe
Resource
win10v2004-20220812-en
General
-
Target
43200d3e1d862c8e24c83ee6d649ea1dcc314eba5cd765bbeb4bae60c5ca1cea
-
Size
80KB
-
MD5
a2bf6fb78d7a7da8974495016ec08c37
-
SHA1
856ebf73650acfad48ccbfeab8fc17d013990a27
-
SHA256
43200d3e1d862c8e24c83ee6d649ea1dcc314eba5cd765bbeb4bae60c5ca1cea
-
SHA512
3d85366debfaa099f184d69898283754d248005280d25989724fb4a86432669aab3ab7dadc7e7cd2320334737e843b6f7abde858d2920eeb7439c1eaf60e1bbc
-
SSDEEP
1536:A56Y6ke9kKIc7DG3PBJhEvI+MRbULJ/tuk6YViKQSb+DDL:zbkYqcHeJi24vHr+DDL
Malware Config
Signatures
Files
-
43200d3e1d862c8e24c83ee6d649ea1dcc314eba5cd765bbeb4bae60c5ca1cea.exe windows x86
f89edc0568b7bd1760cd71584696ec52
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
EnumProcesses
GetModuleFileNameExA
kernel32
SetFilePointer
DeleteFileA
GetFileSize
CreateFileA
lstrcatA
ReleaseMutex
WaitForSingleObject
CreateMutexA
LocalFree
FormatMessageA
GetExitCodeProcess
WaitForMultipleObjects
GetPrivateProfileStringA
WritePrivateProfileStringA
FindClose
FindFirstFileA
SetEvent
TerminateThread
CreateThread
WriteFile
GetComputerNameA
GetCurrentProcess
ResetEvent
CreateEventA
SetCurrentDirectoryA
GetModuleFileNameA
GetTickCount
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
InitializeCriticalSection
DeleteCriticalSection
FlushFileBuffers
lstrlenA
OpenProcess
lstrcpyA
lstrcmpiA
TerminateProcess
CreateProcessA
CloseHandle
Sleep
SetFileAttributesA
CreateDirectoryA
GetLastError
GetLocalTime
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
GetProcAddress
GetModuleHandleA
HeapFree
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapAlloc
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
VirtualQuery
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
HeapSize
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
LoadLibraryA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
advapi32
QueryServiceStatus
StartServiceA
ControlService
DeleteService
CreateServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenProcessToken
CreateProcessAsUserA
SetServiceStatus
LookupPrivilegeValueA
AdjustTokenPrivileges
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ