Static task
static1
Behavioral task
behavioral1
Sample
4022fa0018c15adf58b04676896fd2b752ea7541dcb2100c4b71f1eb1d921b59.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4022fa0018c15adf58b04676896fd2b752ea7541dcb2100c4b71f1eb1d921b59.exe
Resource
win10v2004-20220901-en
General
-
Target
4022fa0018c15adf58b04676896fd2b752ea7541dcb2100c4b71f1eb1d921b59
-
Size
111KB
-
MD5
079ebc1325350d6f831d51bc205c88a4
-
SHA1
5d6a90025d13951b1ce7a6029aa62eeee2c3a901
-
SHA256
4022fa0018c15adf58b04676896fd2b752ea7541dcb2100c4b71f1eb1d921b59
-
SHA512
eb48e1edf43ecff55313bc1269b81e21cf7a82dd6a931e80bdb7fb9666b0451bab0b93fe02b13752a37fc21fc38eb0ee05bb44a8e7c4bb30160f0422a19eb7db
-
SSDEEP
1536:IfSVPWuOZy+V6NH5vv1LQeP2fCFG5XNmjqLvdHOTSmfeOeA67oObOhPxQfyQ6J:I6BA0l1AfeGOqdUF8A6IZX
Malware Config
Signatures
Files
-
4022fa0018c15adf58b04676896fd2b752ea7541dcb2100c4b71f1eb1d921b59.exe windows x86
6b612aa710c382122b8952f21f5b2252
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FileTimeToSystemTime
IsBadWritePtr
FreeEnvironmentStringsW
GetLocalTime
SetThreadLocale
GetThreadLocale
GetEnvironmentStringsW
DeviceIoControl
RemoveDirectoryA
VirtualQuery
CreateProcessW
LocalAlloc
GetFileAttributesW
LocalFree
VirtualProtect
SetHandleCount
SetLastError
GetFileAttributesA
GetFileTime
GetUserDefaultLangID
OpenProcess
GetModuleHandleW
DeleteFileW
CompareStringA
LocalFileTimeToFileTime
GetLocaleInfoW
GlobalReAlloc
SetErrorMode
IsDebuggerPresent
GlobalLock
CreateFileMappingA
GetModuleHandleA
GetConsoleOutputCP
GetTempPathA
GetExitCodeProcess
WriteConsoleA
SetEnvironmentVariableA
CopyFileW
IsDBCSLeadByte
GetSystemTime
lstrlenW
GetCurrentDirectoryA
GetACP
GetDriveTypeA
FileTimeToDosDateTime
LoadResource
WaitForSingleObject
InterlockedIncrement
MulDiv
DeleteFileA
GlobalUnlock
IsBadCodePtr
lstrcmpA
GetCommandLineA
EnumCalendarInfoA
msvcrt
__p___initenv
__p__commode
_controlfp
__setusermatherr
_adjust_fdiv
__set_app_type
_initterm
_except_handler3
_XcptFilter
__p__fmode
__getmainargs
_exit
advapi32
RegDeleteKeyA
GetLengthSid
OpenSCManagerW
CloseServiceHandle
SetSecurityDescriptorOwner
AdjustTokenPrivileges
RegCloseKey
CryptHashData
RevertToSelf
IsValidSid
RegOpenKeyExW
EqualSid
RegDeleteValueW
OpenSCManagerA
GetUserNameA
RegQueryValueExW
RegQueryValueA
RegEnumKeyA
OpenProcessToken
OpenServiceA
SetSecurityDescriptorGroup
CopySid
RegOpenKeyA
InitializeAcl
RegEnumValueW
RegCreateKeyExW
RegEnumValueA
SetSecurityDescriptorDacl
RegEnumKeyExA
FreeSid
AddAccessAllowedAce
user32
InsertMenuA
MessageBoxA
CallNextHookEx
GetMessageA
WindowFromPoint
SetCursor
CloseClipboard
DrawIcon
DrawEdge
DeleteMenu
GetWindowPlacement
GetKeyboardType
SetScrollRange
ClientToScreen
SetWindowPlacement
GetSubMenu
IsWindow
GetSystemMetrics
PtInRect
ScreenToClient
DialogBoxParamA
SetMenu
GetCapture
KillTimer
GetScrollPos
SetClipboardData
GetMenuItemCount
GetMenu
CallWindowProcA
SetFocus
PostQuitMessage
FindWindowA
GetLastActivePopup
TrackPopupMenu
LoadBitmapA
IsWindowEnabled
SetTimer
DrawIconEx
IsDialogMessageA
SetWindowTextA
ShowCursor
GetDC
GetMessagePos
SendMessageA
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ