Static task
static1
Behavioral task
behavioral1
Sample
4a4ee58b83cce767e704d7372aca6d1e69a25f6899d1178e73f6929d20829b04.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a4ee58b83cce767e704d7372aca6d1e69a25f6899d1178e73f6929d20829b04.exe
Resource
win10v2004-20220812-en
General
-
Target
4a4ee58b83cce767e704d7372aca6d1e69a25f6899d1178e73f6929d20829b04
-
Size
232KB
-
MD5
92647c286b08f446996dd239f4f406a5
-
SHA1
4064a9130c49c6d5b7ede1aea08f1ae91279886e
-
SHA256
4a4ee58b83cce767e704d7372aca6d1e69a25f6899d1178e73f6929d20829b04
-
SHA512
4823fcda3468736454e4bd9dde7f4cadd5ab9d6b2d1601532d141e3910e7d988a356e38ed72197f5433bea11cb810b72c2d1c18b908d0c778cb11531f9de4198
-
SSDEEP
6144:jkCMndv8WiYZH5A8sYw367Y+dtjKpkOu:jhMJTdZHm8sY5Kp
Malware Config
Signatures
Files
-
4a4ee58b83cce767e704d7372aca6d1e69a25f6899d1178e73f6929d20829b04.exe windows x86
709c92fb1b0d51e4048409976b042040
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocString
VariantClear
VariantCopy
SysStringByteLen
SysFreeString
user32
CharUpperW
CharPrevA
CharUpperA
CharNextA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
memset
wcsncmp
wcslen
memcpy
fputc
fflush
fgetc
fclose
_iob
free
malloc
memmove
memcmp
fprintf
strlen
fputs
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
VirtualAlloc
GetTickCount
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
MapViewOfFile
GetProcessTimes
UnmapViewOfFile
OpenEventA
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
SearchPathW
SearchPathA
GetCurrentDirectoryW
SetCurrentDirectoryW
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
SetConsoleMode
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExA
LoadLibraryA
AreFileApisANSI
SetCurrentDirectoryA
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
MoveFileA
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
OpenFileMappingA
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE