Static task
static1
Behavioral task
behavioral1
Sample
05bc61cd3103fbba322339bba7fb916a274be8a7c19527bcc3caea9a68f1de35.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
05bc61cd3103fbba322339bba7fb916a274be8a7c19527bcc3caea9a68f1de35.exe
Resource
win10v2004-20220812-en
General
-
Target
05bc61cd3103fbba322339bba7fb916a274be8a7c19527bcc3caea9a68f1de35
-
Size
66KB
-
MD5
0791529a70a01ace62c07e6dad04fda0
-
SHA1
622f596501c6296d778997cb1186606e8ab88252
-
SHA256
05bc61cd3103fbba322339bba7fb916a274be8a7c19527bcc3caea9a68f1de35
-
SHA512
0b0657f53f169fe1749ca99f7a4ff05ef9814743c78b5dba3648141138aea6e196a6f893d75ca12eea0e8eec497d346712744d1a4bea5ff7e66eec064cd1c8e8
-
SSDEEP
1536:CrrFxSHxuui53UcNhejedueye2TcD4iJwE0oK1JisKldt:8z6uuWGCYiJpf5
Malware Config
Signatures
Files
-
05bc61cd3103fbba322339bba7fb916a274be8a7c19527bcc3caea9a68f1de35.exe windows x86
794d9b944e2676f03ccd4aca6c3a6cc7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
InterlockedExchange
LoadLibraryA
GetStartupInfoA
GetTimeZoneInformation
GetUserDefaultLangID
CreateFileMappingA
GetSystemInfo
GetCurrentThread
GetThreadPriority
SetThreadPriority
Sleep
UnmapViewOfFile
MapViewOfFile
SetEvent
lstrcmpA
GetAtomNameA
FlushFileBuffers
GetLocalTime
SetFilePointer
FreeLibrary
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetModuleHandleA
GetCurrentProcess
TerminateProcess
GetCommandLineW
CreateThread
ReleaseMutex
ExitProcess
lstrcmpiA
FindClose
lstrlenA
OpenProcess
WaitForSingleObject
CloseHandle
GetTickCount
GetLastError
GetVersionExA
GetACP
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LocalAlloc
LocalFree
LocalReAlloc
ReadFile
WriteFile
CompareFileTime
IsDBCSLeadByte
InterlockedIncrement
GlobalMemoryStatus
InterlockedDecrement
GetProcessTimes
QueryPerformanceFrequency
user32
GetDesktopWindow
GetDlgItem
DestroyIcon
MsgWaitForMultipleObjects
TranslateMessage
GetWindowThreadProcessId
IsWindow
DestroyWindow
GetSystemMetrics
ReleaseDC
GetDC
shlwapi
StrCatBuffA
StrCmpNW
SHRegGetUSValueW
SHGetValueW
wnsprintfA
StrToIntW
PathRemoveFileSpecW
wvnsprintfA
PathAddBackslashW
PathFindFileNameA
PathFindExtensionW
SHSetValueW
wnsprintfW
StrChrW
StrToIntExW
StrStrIW
PathRemoveBackslashW
StrCatBuffW
PathFileExistsW
PathCombineW
PathAddExtensionW
PathFindFileNameW
StrCmpIW
StrCpyNW
PathAppendW
shfolder
SHGetFolderPathW
oleaut32
SysAllocString
SysFreeString
ole32
CoCreateInstance
CoInitialize
CoUninitialize
txsrvc
TxIsScreenReaderActive
msvcrt
_controlfp
_exit
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
memmove
_c_exit
advapi32
AllocateAndInitializeSid
FreeSid
RegCloseKey
gdi32
GetDeviceCaps
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE