Static task
static1
Behavioral task
behavioral1
Sample
25908f2ef19317a92d54a9749f66401a4b6e90efb44f26e89f28837bfb15bd6c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25908f2ef19317a92d54a9749f66401a4b6e90efb44f26e89f28837bfb15bd6c.exe
Resource
win10v2004-20220812-en
General
-
Target
25908f2ef19317a92d54a9749f66401a4b6e90efb44f26e89f28837bfb15bd6c
-
Size
88KB
-
MD5
f34bc17d50dfbffaecab4b3f426aed49
-
SHA1
3be52623b3788b7d7492c743cab9fabb8754c237
-
SHA256
25908f2ef19317a92d54a9749f66401a4b6e90efb44f26e89f28837bfb15bd6c
-
SHA512
8b2a0930fd4ee41eed0a1bfec5fb9edf686c534b751edc9ba105da4a8f5c80d2590f2b57ca3624542f9b20bf1b2cfb4da02a8d1e27337dd410ccb54ed93a7292
-
SSDEEP
1536:S38sjrr9kHTPgnG1myBHdMyj32+sIEeltxO:S3PkguXd7GQEeltxO
Malware Config
Signatures
Files
-
25908f2ef19317a92d54a9749f66401a4b6e90efb44f26e89f28837bfb15bd6c.exe windows x86
1c8aaed9c51be10891cf902187f9ac23
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
GetLogicalDriveStringsA
QueryDosDeviceA
CreateToolhelp32Snapshot
Process32First
Process32Next
TerminateProcess
GetCurrentProcess
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
lstrcpyn
HeapFree
IsBadReadPtr
WriteFile
CreateFileA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetVersionExA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
CloseHandle
OpenProcess
HeapReAlloc
GetCurrentProcessId
GetCommandLineA
GetVersion
RtlUnwind
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetLastError
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetFilePointer
InterlockedDecrement
InterlockedIncrement
SetUnhandledExceptionFilter
IsBadCodePtr
LCMapStringW
SetStdHandle
FlushFileBuffers
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
psapi
GetProcessImageFileNameA
user32
MessageBoxA
wsprintfA
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE