Static task
static1
Behavioral task
behavioral1
Sample
afbf7dc02e0f11e0bd9440fb03e54dbc6be02b60bfb37779919f294ae282911b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afbf7dc02e0f11e0bd9440fb03e54dbc6be02b60bfb37779919f294ae282911b.exe
Resource
win10v2004-20220901-en
General
-
Target
afbf7dc02e0f11e0bd9440fb03e54dbc6be02b60bfb37779919f294ae282911b
-
Size
119KB
-
MD5
07c27a2e6de5d69aae81445376dc179f
-
SHA1
1e414127816897078a34b9794f004d00796dd790
-
SHA256
afbf7dc02e0f11e0bd9440fb03e54dbc6be02b60bfb37779919f294ae282911b
-
SHA512
7654e6f86a8930ba6911bffd254206ae533d146093f30926cbd0e4ccab43e0686c11926120f770e6c1d797810ee012223295e04a61601d15fd0137038abd9063
-
SSDEEP
1536:tFKxH9kAJ0Av7+ix1FCG43FJWDxPvTJtOPD31wKSb6MLkmyhrC+QEd:tF4HZ0AjsG4VeFcD313SPL2hrCEd
Malware Config
Signatures
Files
-
afbf7dc02e0f11e0bd9440fb03e54dbc6be02b60bfb37779919f294ae282911b.exe windows x86
b08582b67ffbb8cf504345256506d268
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
Sleep
ExitProcess
OpenProcess
CloseHandle
GetModuleFileNameW
GetSystemDirectoryW
GetTempPathW
GetTempFileNameW
CopyFileW
CreateFileW
ReadFile
SetFilePointer
WriteFile
DeleteFileW
FreeLibrary
GetProcAddress
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
SetUnhandledExceptionFilter
GetCommandLineA
GetProcessHeap
HeapAlloc
GetTempFileNameA
GetSystemDirectoryA
MultiByteToWideChar
lstrlenA
GetVersionExW
CreateFileA
GetVolumeInformationA
FindClose
FindNextFileA
DeleteFileA
RemoveDirectoryA
LoadLibraryW
FindFirstFileA
SetEndOfFile
HeapReAlloc
IsProcessorFeaturePresent
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetLastError
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapFree
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
GetStringTypeW
HeapSize
advapi32
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
shell32
SHGetFolderPathW
SHGetSpecialFolderPathA
SHGetFolderPathA
psapi
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE