Static task
static1
Behavioral task
behavioral1
Sample
22dd44519548b4b1ddea17ff1bcae2d59b7f14c32571a10d8d489be73766bd4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22dd44519548b4b1ddea17ff1bcae2d59b7f14c32571a10d8d489be73766bd4a.exe
Resource
win10v2004-20220812-en
General
-
Target
22dd44519548b4b1ddea17ff1bcae2d59b7f14c32571a10d8d489be73766bd4a
-
Size
12.4MB
-
MD5
0ae5fddc4a858868fc3db14c51618116
-
SHA1
a57b0f1ded08abcb8f2430d0d54e2f51df91e8f6
-
SHA256
22dd44519548b4b1ddea17ff1bcae2d59b7f14c32571a10d8d489be73766bd4a
-
SHA512
0b00640cc46fd9444d7a723c68663a5ab1ebefbc4899b8348dd23d0f736c5f49c5291a3e9f9ece1065a5f4e18e68e1068506fef259793ef679037510ece0aacc
-
SSDEEP
196608:+I3tl9+qWpJEfsdgsChHe3TJ7Ez/MycMpP0TIf:PfMqWpJEf/H+V7cF
Malware Config
Signatures
Files
-
22dd44519548b4b1ddea17ff1bcae2d59b7f14c32571a10d8d489be73766bd4a.exe windows x86
47de1f1e00c34b038bf09f8dca0e4ef9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
InitializeCriticalSection
OpenProcess
GetSystemDirectoryW
LoadLibraryW
GetModuleFileNameW
ExitThread
lstrlenW
VirtualUnlock
GetProcAddress
VirtualAlloc
GetSystemInfo
WaitForMultipleObjects
lstrcmpiW
lstrcatW
DeleteCriticalSection
GetWindowsDirectoryW
GetCommandLineA
GetVolumeInformationW
CreateThread
lstrcpyA
LeaveCriticalSection
EnterCriticalSection
VirtualLock
FindFirstFileW
GetDriveTypeW
lstrcmpW
MoveFileW
FindClose
FindNextFileW
VerSetConditionMask
VerifyVersionInfoW
LoadLibraryA
GetModuleHandleA
VirtualFree
GetModuleHandleW
GetComputerNameW
WaitForSingleObject
SetErrorMode
ExitProcess
CloseHandle
GetLastError
CreateFileW
ReadFile
Sleep
WriteFile
lstrcpyW
SetFilePointerEx
IsProcessorFeaturePresent
user32
wsprintfW
advapi32
CryptGenKey
CryptImportKey
CryptReleaseContext
CryptGetKeyParam
CryptAcquireContextW
CryptExportKey
RegSetValueExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
CryptDestroyKey
CryptEncrypt
shell32
SHGetSpecialFolderPathW
ShellExecuteW
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ