Static task
static1
Behavioral task
behavioral1
Sample
5842eea8d50f02567b9a9c25ef44a70db597e45902f2d14d5f3b21943c0604df.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5842eea8d50f02567b9a9c25ef44a70db597e45902f2d14d5f3b21943c0604df.exe
Resource
win10v2004-20220812-en
General
-
Target
5842eea8d50f02567b9a9c25ef44a70db597e45902f2d14d5f3b21943c0604df
-
Size
189KB
-
MD5
84ef04dba5b29d388cad1ec8e9d87160
-
SHA1
02ecca9709dc2fff3ce1c79dfeb3cf3603a96bcd
-
SHA256
5842eea8d50f02567b9a9c25ef44a70db597e45902f2d14d5f3b21943c0604df
-
SHA512
dbc9f8c14d863d15c02e9e35b2303a0c0587ca3e184569d3fad857d788831e16ceff497f37ca5a5aabde2c993dabd1bed42edefbb855b86d83ed25dbf2c66cc8
-
SSDEEP
3072:KcGibUUPA94NcBBRBzQVlIcRUjauFBpn+:KcGVUI94gTuVCcR9Yp+
Malware Config
Signatures
Files
-
5842eea8d50f02567b9a9c25ef44a70db597e45902f2d14d5f3b21943c0604df.exe windows x86
950df57a59e3f593262bcaf10cadc60e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlUnwind
NtClose
kernel32
GetProcessTimes
GetCurrentThreadId
GetCurrentProcessId
GetThreadTimes
LoadLibraryA
HeapReAlloc
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
InterlockedCompareExchange
HeapDestroy
HeapCreate
HeapSize
MultiByteToWideChar
SetUnhandledExceptionFilter
GetLastError
GetModuleHandleW
GetProcAddress
LocalFree
GetNativeSystemInfo
GetSystemTimeAsFileTime
GetVersionExW
GetThreadContext
SetThreadContext
CreateProcessW
VirtualFreeEx
GetProcessHeap
TerminateProcess
GetModuleFileNameW
VirtualProtectEx
VirtualAllocEx
WriteProcessMemory
ResumeThread
CreateThread
CreateMutexW
InitializeCriticalSection
LeaveCriticalSection
OpenMutexW
EnterCriticalSection
DeleteCriticalSection
Sleep
WTSGetActiveConsoleSessionId
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
GetCurrentThread
GetTickCount
GetCurrentProcess
LCMapStringW
GetStringTypeW
LoadLibraryW
IsProcessorFeaturePresent
SetLastError
TlsFree
DecodePointer
TlsSetValue
GetCommandLineA
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
user32
GetKBCodePage
GetDesktopWindow
GetCapture
GetClipboardOwner
GetShellWindow
GetOpenClipboardWindow
GetFocus
GetActiveWindow
GetForegroundWindow
advapi32
RegCloseKey
SetSecurityDescriptorSacl
GetSecurityDescriptorSacl
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExW
shell32
ord680
ShellExecuteExW
SHGetFolderPathW
ole32
CoInitializeEx
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ