Static task
static1
Behavioral task
behavioral1
Sample
19f631b079f1996f0081c0763f069fa25fd08b6a973ff4b9edff858f34162f23.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19f631b079f1996f0081c0763f069fa25fd08b6a973ff4b9edff858f34162f23.exe
Resource
win10v2004-20220901-en
General
-
Target
19f631b079f1996f0081c0763f069fa25fd08b6a973ff4b9edff858f34162f23
-
Size
109KB
-
MD5
06d7520b8e570973c3db641055177e48
-
SHA1
8fc9fa61d1590cd321c9b21f045a79d41fd9dedc
-
SHA256
19f631b079f1996f0081c0763f069fa25fd08b6a973ff4b9edff858f34162f23
-
SHA512
4683c93d4be89695ec83523f7ad7095a542d5b5550646a25a77a16278329a295b87f21226b204cff82629621c86655ac3eb2dccee9c7ecd6e0c014787d271125
-
SSDEEP
3072:A2NtCnlU6CT6my2QJfb72IvhydMzwIpwR:AGkuTG77XqME
Malware Config
Signatures
Files
-
19f631b079f1996f0081c0763f069fa25fd08b6a973ff4b9edff858f34162f23.exe windows x86
f05b37c158fdde34e1bf227fcab5a0a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetTimeZoneInformation
GetThreadLocale
GetEnvironmentStrings
LocalFileTimeToFileTime
GetFileTime
CopyFileW
GetCurrentDirectoryA
LoadResource
GetStringTypeW
InterlockedDecrement
GetModuleFileNameA
GetFileType
GetLocaleInfoW
RemoveDirectoryA
GetTempPathA
IsDebuggerPresent
GetTempPathW
GlobalAlloc
CreateProcessA
CompareStringW
GetModuleHandleA
GetEnvironmentStringsW
GetSystemDirectoryW
lstrcmpA
GetWindowsDirectoryA
DeleteFileW
IsBadCodePtr
DeleteFileA
GlobalLock
GetDriveTypeA
GetDiskFreeSpaceA
GlobalReAlloc
GetModuleHandleW
VirtualProtect
GetSystemDirectoryA
lstrlenW
GetCurrentProcess
lstrcmpiW
GetFileAttributesW
lstrcmpiA
InterlockedExchange
SetFilePointer
GetUserDefaultLangID
OpenProcess
GetExitCodeProcess
CreateProcessW
RtlUnwind
GetStartupInfoA
GetSystemTime
CopyFileA
VirtualFree
SetFileAttributesW
GetConsoleMode
msvcrt
__p__fmode
__getmainargs
_except_handler3
__set_app_type
__p__commode
_exit
__p___initenv
_controlfp
__setusermatherr
_XcptFilter
_adjust_fdiv
_initterm
user32
InsertMenuA
UpdateWindow
ShowCursor
GetMenu
IsChild
GetSubMenu
SetWindowPos
IsWindowEnabled
GetMenuItemCount
SetMenu
DispatchMessageA
WaitMessage
GetLastActivePopup
CreatePopupMenu
CharLowerA
RemovePropA
CloseClipboard
ReleaseCapture
LoadBitmapA
DrawMenuBar
GetKeyState
GetScrollPos
SetTimer
GetScrollRange
ShowWindow
InflateRect
GetClassNameA
GetMenuItemID
InsertMenuItemA
wsprintfA
CheckMenuItem
DeleteMenu
GetSysColorBrush
SetCursor
GetTopWindow
SetWindowTextA
AdjustWindowRectEx
PtInRect
GetActiveWindow
SetPropA
ReleaseDC
DialogBoxParamA
TranslateMessage
MessageBeep
OffsetRect
SetForegroundWindow
SendMessageA
IsWindow
ClientToScreen
OpenClipboard
GetSystemMetrics
GetDlgItem
advapi32
OpenSCManagerA
CopySid
GetUserNameA
RegSetValueExA
RegCreateKeyA
DeregisterEventSource
RegQueryInfoKeyW
EqualSid
OpenProcessToken
RegOpenKeyExW
FreeSid
CryptReleaseContext
RegDeleteValueA
GetTokenInformation
RegDeleteKeyA
RegEnumKeyA
LookupPrivilegeValueW
RegCreateKeyExA
RegDeleteKeyW
RegQueryInfoKeyA
SetSecurityDescriptorGroup
OpenServiceW
CryptGenRandom
Sections
.text Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ