Static task
static1
Behavioral task
behavioral1
Sample
f46584e8ab292768d463917f5c015fc179e5c43fdf90c2479891bf267755d696.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f46584e8ab292768d463917f5c015fc179e5c43fdf90c2479891bf267755d696.exe
Resource
win10v2004-20220901-en
General
-
Target
f46584e8ab292768d463917f5c015fc179e5c43fdf90c2479891bf267755d696
-
Size
109KB
-
MD5
0a08cb2df0d619472ece0e0bc419e0e9
-
SHA1
2fdfb06016f2a8d3093c1cf9f232589713e110b8
-
SHA256
f46584e8ab292768d463917f5c015fc179e5c43fdf90c2479891bf267755d696
-
SHA512
09e45e4f64d46da08438a1d19b8e7c129ff12cc3ca9a18ff38abf96073b065ec5a6136093540a9b24e3421f9965f670a91af8badc3beb4218cbe6dd082727338
-
SSDEEP
3072:gIR6w9lObldjWexhZBDLsbv5kelWSFU4yWj72y9:rR+nZl4dkCcY2
Malware Config
Signatures
Files
-
f46584e8ab292768d463917f5c015fc179e5c43fdf90c2479891bf267755d696.exe windows x86
bb8f25b7006547488af002f7cea6a52f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LoadResource
VirtualQuery
DeleteFileA
GetModuleHandleA
CreateProcessA
LocalAlloc
RaiseException
lstrlenA
GetTempPathA
GetLastError
SetLastError
GetModuleHandleW
GetUserDefaultLangID
GetExitCodeProcess
FileTimeToLocalFileTime
IsDebuggerPresent
GetSystemTime
FreeEnvironmentStringsW
GetLocalTime
IsDBCSLeadByte
GetSystemInfo
GetDiskFreeSpaceA
GetFileAttributesA
LocalFileTimeToFileTime
GetWindowsDirectoryA
FreeEnvironmentStringsA
CompareStringW
GetFileTime
EnumCalendarInfoA
VirtualFree
WriteConsoleA
GetTempFileNameA
FileTimeToDosDateTime
lstrcmpiA
WritePrivateProfileStringA
FlushFileBuffers
VirtualProtect
GetDateFormatA
GetCurrentProcessId
GetUserDefaultLCID
GetThreadLocale
CreateProcessW
SetCurrentDirectoryA
GetOEMCP
msvcrt
__getmainargs
_initterm
_adjust_fdiv
_controlfp
__setusermatherr
__p__fmode
__p___initenv
_except_handler3
_XcptFilter
__p__commode
_exit
__set_app_type
advapi32
RegCreateKeyExW
RegSetValueExA
LookupPrivilegeValueW
OpenSCManagerW
CryptReleaseContext
AddAccessAllowedAce
OpenServiceA
RegOpenKeyW
LookupPrivilegeValueA
AdjustTokenPrivileges
CryptDestroyHash
SetSecurityDescriptorDacl
CryptHashData
CryptCreateHash
InitializeSecurityDescriptor
GetUserNameA
RegDeleteKeyA
RegQueryInfoKeyA
RegDeleteKeyW
ControlService
RegEnumValueW
CryptAcquireContextA
RegQueryInfoKeyW
InitializeAcl
GetLengthSid
CopySid
DeleteService
RegQueryValueExA
SetSecurityDescriptorGroup
InitiateSystemShutdownA
GetTokenInformation
RegOpenKeyExA
CloseServiceHandle
RegFlushKey
CheckTokenMembership
IsValidSid
RegEnumKeyExA
RegDeleteValueA
RegOpenKeyExW
user32
RegisterClassA
SetPropA
ShowCursor
MapWindowPoints
GetSubMenu
GetMenuItemCount
InvalidateRect
GetWindowThreadProcessId
DrawIconEx
IsIconic
EqualRect
GetWindowPlacement
GetDesktopWindow
SetRect
SetForegroundWindow
SetClipboardData
CreateWindowExA
EndDialog
PeekMessageA
OffsetRect
GetCursorPos
GetDC
FillRect
GetWindowLongA
EnableMenuItem
EmptyClipboard
GetSystemMenu
WinHelpA
InflateRect
SetWindowPos
KillTimer
GetPropA
GetKeyState
GetLastActivePopup
MessageBoxA
GetIconInfo
SetWindowTextA
IsDialogMessageA
EnumThreadWindows
Sections
.text Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ