Static task
static1
Behavioral task
behavioral1
Sample
f671a360f07bc0533bc30efd5320c77d4730aff4bfbe924fec5058475c65081e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f671a360f07bc0533bc30efd5320c77d4730aff4bfbe924fec5058475c65081e.exe
Resource
win10v2004-20220812-en
General
-
Target
f671a360f07bc0533bc30efd5320c77d4730aff4bfbe924fec5058475c65081e
-
Size
127KB
-
MD5
0cb27b85c4e7348d38d2fae9243d9875
-
SHA1
9d1989a9561bb041084ee14acfcca6a59867cd31
-
SHA256
f671a360f07bc0533bc30efd5320c77d4730aff4bfbe924fec5058475c65081e
-
SHA512
670a29d23073bcbf8a7a3fd9ec3580e49c61bf69fb9ca91fb034763ad46275af4069e059ee259207e5d2a3b27ce9197837283e0d162a0a38e3ae766c1dd9a384
-
SSDEEP
1536:RNbd/Otq9qffTiZCVsqPgpunBik5Iv9MrCz/e80A:R9g0+fT+kTPg03s9MrCz/1B
Malware Config
Signatures
Files
-
f671a360f07bc0533bc30efd5320c77d4730aff4bfbe924fec5058475c65081e.exe windows x86
0d50bfbfd92cb1995c5f95f384bddee0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
WritePrivateProfileStringA
GetModuleFileNameW
GetModuleFileNameA
CloseHandle
LocalFree
GetVersionExW
SizeofResource
CopyFileW
Sleep
GetTickCount
WaitForSingleObject
GetCurrentProcess
CreateProcessW
LoadResource
FindResourceW
FindResourceExW
LockResource
GetCommandLineW
SetEnvironmentVariableA
CompareStringW
FlushFileBuffers
CreateFileW
GetStringTypeW
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetSystemTimeAsFileTime
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
WideCharToMultiByte
GetTimeZoneInformation
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
RtlUnwind
LoadLibraryW
SetStdHandle
WriteConsoleW
LCMapStringW
advapi32
ControlService
QueryServiceStatus
StartServiceW
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
RegCloseKey
shell32
CommandLineToArgvW
SHGetSpecialFolderPathW
shlwapi
PathRemoveFileSpecW
PathRemoveFileSpecA
PathAppendA
PathAppendW
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ