Static task
static1
Behavioral task
behavioral1
Sample
a13f1e06d6c590b6df7251e544f19f92f20c4e8d01da273b48e7b9f8e6b9208a.exe
Resource
win7-20220812-en
General
-
Target
a13f1e06d6c590b6df7251e544f19f92f20c4e8d01da273b48e7b9f8e6b9208a
-
Size
813KB
-
MD5
04ce446a7adb20f975e6fb4b08831170
-
SHA1
0d6141d3515bddbaabc183065ca03d76769bcf1b
-
SHA256
a13f1e06d6c590b6df7251e544f19f92f20c4e8d01da273b48e7b9f8e6b9208a
-
SHA512
1d5a330023dc3be73a235fb420fe549dd0651051db85d6158b3dc7f4df922d5e8a9dab921167536ae8c5753aa9eb63b238c4c8e62827520862feedd9054629af
-
SSDEEP
12288:r7T3kyeEeg/gGItPX+rhOi9OP7/diT4uc5N/nI4NQLG+kjn:3Pe2OtPurk6Oz/UuT/I4NQa/
Malware Config
Signatures
Files
-
a13f1e06d6c590b6df7251e544f19f92f20c4e8d01da273b48e7b9f8e6b9208a.exe windows x64
5dfbfc13a5c10c08154762ccbde7bd5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumValueW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegSetValueExW
TraceMessage
RegQueryValueExW
kernel32
SetEvent
CloseHandle
GetVersion
QueryDosDeviceW
GetDriveTypeW
DebugBreak
DeviceIoControl
GetWindowsDirectoryW
CreateFileW
CreateThread
SetErrorMode
GetFileAttributesW
GetExitCodeThread
SetLastError
LeaveCriticalSection
EnterCriticalSection
ExpandEnvironmentStringsW
CompareStringW
WideCharToMultiByte
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
Sleep
lstrlenA
VirtualQuery
FindResourceW
FreeLibrary
LoadResource
LoadLibraryExW
WaitForSingleObject
GetModuleHandleW
InitializeCriticalSection
LoadLibraryW
SizeofResource
GetVersionExW
HeapDestroy
lstrcpynW
GetModuleFileNameW
MultiByteToWideChar
lstrlenW
GetLastError
GetProcAddress
VirtualAlloc
CreateEventW
GetSystemInfo
lstrcmpiW
lstrcatW
VirtualProtect
DeleteCriticalSection
user32
CharNextW
CharPrevW
msvcrt
??_V@YAXPEAX@Z
malloc
free
_wcmdln
_initterm
_amsg_exit
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
wcspbrk
_vsnwprintf
_purecall
iswspace
wcsncmp
towupper
_wtol
iswdigit
_wcsicmp
bsearch
_beginthreadex
_wtoi
memset
memcpy
??3@YAXPEAX@Z
realloc
??2@YAPEAX_K@Z
__wgetmainargs
__C_specific_handler
_XcptFilter
_exit
_cexit
exit
wcschr
towlower
memmove
??_U@YAPEAX_K@Z
_wcsnicmp
wcsrchr
wcsstr
memcmp
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlVirtualUnwind
mpr
WNetGetConnectionW
WNetCancelConnection2W
WNetAddConnection2W
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoUninitialize
PropVariantClear
oleaut32
VariantClear
SysAllocStringLen
SysStringLen
SysAllocString
VarUI4FromStr
SysFreeString
shell32
ShellExecuteExW
shlwapi
PathGetCharTypeW
ord158
mf
MFGetSupportedSchemes
Sections
.text Size: 240KB - Virtual size: 239KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 564KB - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE