Static task
static1
Behavioral task
behavioral1
Sample
f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb.exe
Resource
win10v2004-20220812-en
General
-
Target
f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb
-
Size
30KB
-
MD5
0e14225a47501ef15281b1e289338908
-
SHA1
a73d7487e1463ed152bbea7780d398d9c53f82bb
-
SHA256
f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb
-
SHA512
d99e7f0a35ed5baca648098ef95255c8fdf8fe4455238bc8bfed0acae8b66363679d06562a89e1c600526570dbd25ceddfbd7779e555210a0b581ae8c155c80a
-
SSDEEP
768:tMboL8fTmVcS7bWm83bjmuiH8e3DHkZnklXc:qYATmJ7inb0H8EIj
Malware Config
Signatures
Files
-
f68f92055bda147f44627c526b3ffc411bbbfbe6ea57ba69ce6e6caaef5729eb.exe windows x86
1cd18dda450284992ae7cce4d7c5f677
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
GetLocaleInfoA
GetStartupInfoW
GlobalMemoryStatus
GetSystemDefaultUILanguage
GetLocalTime
GetDiskFreeSpaceA
EncodePointer
CompareStringW
CompareFileTime
SetConsoleMode
GetComputerNameW
GetTimeFormatW
HeapFree
UnmapViewOfFile
ConvertDefaultLocale
lstrcpynW
CreateFileA
WriteConsoleInputA
ReleaseMutex
GetStringTypeExW
CreateMutexA
SetThreadContext
SetFilePointerEx
lstrlenA
LoadLibraryW
MapViewOfFile
IsDBCSLeadByte
ExitThread
AllocConsole
GetConsoleMode
GetEnvironmentStrings
GetStdHandle
FindFirstFileA
GetThreadTimes
FindResourceW
FileTimeToDosDateTime
GetCommandLineA
lstrcmpiW
GlobalSize
GetCurrentDirectoryA
WritePrivateProfileStringA
GetFileSize
GlobalFindAtomW
GetLongPathNameA
GlobalAddAtomA
SetDllDirectoryW
SetFilePointer
SetConsoleWindowInfo
GetCurrentThread
GetLastError
ActivateActCtx
GetNumberFormatW
GetProfileIntW
CreateMutexW
SuspendThread
HeapSetInformation
HeapValidate
CopyFileW
IsValidLocale
ExitProcess
CreateDirectoryW
GetShortPathNameA
FreeLibrary
GetACP
GetFileAttributesExW
TlsAlloc
GetProfileIntA
GetStringTypeExA
InterlockedIncrement
IsValidCodePage
ReadConsoleInputA
DeleteFileW
VirtualAlloc
LocalFileTimeToFileTime
CreateFileMappingA
VerifyVersionInfoW
GetEnvironmentStringsW
VirtualProtect
GetPrivateProfileSectionW
GetProcAddress
CreateThread
GetEnvironmentVariableW
CreateDirectoryA
InterlockedCompareExchange
LocalFree
SetEnvironmentVariableW
CreateProcessW
TlsSetValue
GetSystemDirectoryA
ReadProcessMemory
SetStdHandle
GetTempPathA
GlobalAlloc
GetThreadLocale
ResetEvent
IsDBCSLeadByteEx
VirtualFree
GlobalGetAtomNameW
FindResourceExA
GetLogicalDrives
GetCPInfo
GetWindowsDirectoryA
FatalAppExitA
RemoveDirectoryA
ReleaseActCtx
SetFileTime
GetCurrentThreadId
SetSystemPowerState
user32
LoadKeyboardLayoutEx
EnumClipboardFormats
DdeInitializeW
RegisterWindowMessageW
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ