Static task
static1
Behavioral task
behavioral1
Sample
4a7f86e52b40b402d7b07e24bab67739e1f21bc95e5d165c779441c65b2d10bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a7f86e52b40b402d7b07e24bab67739e1f21bc95e5d165c779441c65b2d10bd.exe
Resource
win10v2004-20220812-en
General
-
Target
4a7f86e52b40b402d7b07e24bab67739e1f21bc95e5d165c779441c65b2d10bd
-
Size
102KB
-
MD5
0fc71a9ff2e30739e273ea20f8748655
-
SHA1
87766c9ffd10833b1adbf267d8d70d0ca00bdb12
-
SHA256
4a7f86e52b40b402d7b07e24bab67739e1f21bc95e5d165c779441c65b2d10bd
-
SHA512
15b23b0bfc6366236f80101079aee69c131013f91d021eaee0c4ab9fb4859e560e52414c880687050e92d179d24526e084d5bdc4f531515ac39965e2cd6ca20e
-
SSDEEP
1536:vsnbhsmrSydJSmptpQCTMUWjdYzAwdkup2riBEbOiQEC/5Wfkr:knbQyTD1Khfw1p2rkjB5r
Malware Config
Signatures
Files
-
4a7f86e52b40b402d7b07e24bab67739e1f21bc95e5d165c779441c65b2d10bd.exe windows x86
40766dfc1a381137b2dcfe37dd28d932
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetSystemDirectoryA
GetFileAttributesA
GetDiskFreeSpaceA
GetCurrentProcess
GetACP
FileTimeToSystemTime
GlobalAlloc
GetTimeZoneInformation
GetTempPathA
GetVersionExW
GetCurrentDirectoryA
lstrcmpiW
CreateFileMappingA
SetUnhandledExceptionFilter
GetModuleHandleW
GetThreadLocale
GetLocalTime
GetEnvironmentStrings
CopyFileW
lstrcpyA
GetLocaleInfoW
GetModuleHandleA
GlobalUnlock
GetConsoleMode
GetFileTime
SetStdHandle
GetUserDefaultLangID
CompareStringW
lstrcmpA
QueryPerformanceCounter
GetExitCodeProcess
DuplicateHandle
VirtualProtect
InterlockedIncrement
IsValidCodePage
GetFileAttributesW
LocalAlloc
InterlockedDecrement
SetFileAttributesA
GetSystemDirectoryW
GetUserDefaultLCID
MoveFileA
SetThreadLocale
SetFileAttributesW
GetStartupInfoW
GetStdHandle
IsDebuggerPresent
GetOEMCP
LoadResource
GetDriveTypeA
ExitProcess
DeleteFileA
Sleep
GetPrivateProfileStringA
GetLocaleInfoA
msvcrt
__p__commode
_exit
__p__fmode
_XcptFilter
__p___initenv
_initterm
__getmainargs
_except_handler3
__set_app_type
_controlfp
__setusermatherr
_adjust_fdiv
advapi32
RegOpenKeyExW
InitializeAcl
AddAccessAllowedAce
RegOpenKeyW
CopySid
RegQueryValueExA
RegCreateKeyExW
RegQueryValueA
GetUserNameA
RegQueryInfoKeyW
RegDeleteKeyW
OpenServiceA
RegQueryValueExW
DeleteService
AdjustTokenPrivileges
IsValidSid
InitializeSecurityDescriptor
RegOpenKeyA
OpenProcessToken
RegSetValueExW
SetSecurityDescriptorOwner
CryptCreateHash
RegEnumValueA
OpenThreadToken
SetSecurityDescriptorGroup
RegDeleteValueW
GetLengthSid
AllocateAndInitializeSid
RegEnumKeyW
RegEnumKeyExW
RegDeleteValueA
FreeSid
user32
InflateRect
GetDC
SetClipboardData
GetParent
RegisterClipboardFormatA
DeleteMenu
IsRectEmpty
GetClassNameA
SetForegroundWindow
MessageBoxA
WinHelpA
PeekMessageA
CallNextHookEx
DrawTextA
OffsetRect
KillTimer
GetMessageA
DrawEdge
SetWindowLongA
EndPaint
CallWindowProcA
InsertMenuA
GetMenuItemCount
LoadIconA
SetClassLongA
EnumWindows
EndDialog
GetLastActivePopup
ScrollWindow
IsWindowEnabled
IsWindowVisible
SetScrollRange
CharNextA
UnhookWindowsHookEx
EqualRect
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ