Static task
static1
Behavioral task
behavioral1
Sample
796a87bd0e9fbfeec982d43717c3651bdec1679d96efb0e12a9e091dd0acdfc5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
796a87bd0e9fbfeec982d43717c3651bdec1679d96efb0e12a9e091dd0acdfc5.exe
Resource
win10v2004-20220901-en
General
-
Target
796a87bd0e9fbfeec982d43717c3651bdec1679d96efb0e12a9e091dd0acdfc5
-
Size
252KB
-
MD5
92f72bbe76d505a7918ce7cd7c858061
-
SHA1
44a2d82a1c3f0d133e2c7b7431feef57c64d170d
-
SHA256
796a87bd0e9fbfeec982d43717c3651bdec1679d96efb0e12a9e091dd0acdfc5
-
SHA512
6633249dd1c60d7aa1685addf9dbd7bad76bb8213f5d6bd2ba24f4b5848f2236cce5be28d2a8d77721e67fea96ac9b6ac77527b99d9253dd00c76183c67791f2
-
SSDEEP
6144:oHQ059iLLG1REofz5K3W4kcSar5lOkU07TBBXVh0:ow0qkGk5K3mWr5lOT0PBN0
Malware Config
Signatures
Files
-
796a87bd0e9fbfeec982d43717c3651bdec1679d96efb0e12a9e091dd0acdfc5.exe windows x86
c03a982e9088b1ec40b9a979fe0102b1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessShutdownParameters
DisconnectNamedPipe
GetEnvironmentStringsA
GetModuleFileNameA
GetCommandLineA
EnumSystemLocalesA
GetExitCodeThread
PulseEvent
DeleteFileA
WriteProfileSectionA
ConnectNamedPipe
FreeResource
GetCurrentThread
SetVDMCurrentDirectories
GetProcessWorkingSetSize
GetFileAttributesExA
AddConsoleAliasA
GetTempPathA
GetCurrentThreadId
ReadConsoleInputA
LZStart
FindFirstVolumeMountPointA
GetSystemDirectoryA
GetStdHandle
FlushConsoleInputBuffer
ReadConsoleOutputCharacterA
SetProcessPriorityBoost
ReadConsoleOutputAttribute
GetVersionExA
SearchPathA
OpenMutexA
GetEnvironmentVariableA
SetFirmwareEnvironmentVariableA
MoveFileExA
HeapSize
GetComputerNameA
GetVolumePathNameA
FindNextVolumeMountPointA
WritePrivateProfileStructA
lstrcmpiA
VirtualAlloc
GetConsoleCommandHistoryLengthA
GetDllDirectoryA
GetVersion
GetPrivateProfileStringA
GetCurrentConsoleFont
HeapDestroy
GetSystemTime
GetConsoleCursorMode
SetHandleCount
GetTimeFormatA
OpenFileMappingA
GetFileSize
VirtualAllocEx
GetTickCount
GetVersionExA
GetVersionExA
GetPrivateProfileIntA
IsValidCodePage
CloseHandle
SetCommState
SetFileAttributesA
SetLastError
FileTimeToSystemTime
GetVolumeNameForVolumeMountPointA
ClearCommBreak
UnregisterWait
GetCurrentProcessId
GlobalGetAtomNameA
GetVolumePathNameA
lstrlenA
GetDevicePowerState
WriteFileGather
HeapUnlock
LZInit
Process32Next
OpenWaitableTimerA
SleepEx
GetNumberFormatA
HeapReAlloc
VerifyVersionInfoA
FlushViewOfFile
WriteProcessMemory
avifil32
AVIBuildFilter
user32
SetClipboardViewer
SetClipboardData
InSendMessage
shell32
DragAcceptFiles
crtdll
_CIacos
opengl32
glReadPixels
Sections
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA Size: - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 532B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE