Static task
static1
Behavioral task
behavioral1
Sample
0db2d9a56eacb04e241673b6ec2f80aa505faadf5d30ab97defe6ddc7c2478ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0db2d9a56eacb04e241673b6ec2f80aa505faadf5d30ab97defe6ddc7c2478ee.exe
Resource
win10v2004-20220812-en
General
-
Target
0db2d9a56eacb04e241673b6ec2f80aa505faadf5d30ab97defe6ddc7c2478ee
-
Size
108KB
-
MD5
049d69d6a1a09e560f2bd87ca323c4a0
-
SHA1
65c7b6d7927ebc152de06c1f58d89685e3b29f0f
-
SHA256
0db2d9a56eacb04e241673b6ec2f80aa505faadf5d30ab97defe6ddc7c2478ee
-
SHA512
430651dd5a71e9e3c08306cd09ca2c1960df9439253ff4e63904a19bf5533fa0e25c62403babf195d09d9c8f2c58b34e292286aebfec8f0fc4ec5503d4df895f
-
SSDEEP
1536:4fzBKQSgBWSIa5ZEitWv1ngu8OQ1P8XGp/zJD6awGbVLqwnGVQ1kBnNwqD:ojqa5lWtD8O+zzF6awEVewbUOqD
Malware Config
Signatures
Files
-
0db2d9a56eacb04e241673b6ec2f80aa505faadf5d30ab97defe6ddc7c2478ee.exe windows x86
8ef734b35f1000fbac55659c4739f5ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetSystemDirectoryA
MulDiv
LoadResource
IsDebuggerPresent
GetCurrentThread
InterlockedCompareExchange
CompareStringA
DeleteFileW
FormatMessageA
GetCommandLineW
GetConsoleOutputCP
GetVersion
VirtualProtect
GetConsoleMode
GetThreadLocale
SetErrorMode
GetSystemTime
GetVersionExW
GetExitCodeProcess
SetCurrentDirectoryA
GetVersionExA
SetFileAttributesA
RaiseException
GetModuleHandleW
GetEnvironmentStrings
WaitForSingleObject
GetACP
ExitProcess
SetLastError
DeleteFileA
LocalAlloc
CreateProcessA
lstrcpyA
GetCurrentProcess
FlushFileBuffers
lstrcatA
lstrcmpiW
GetTempPathA
GetModuleFileNameA
GetUserDefaultLangID
GetLocaleInfoW
GetStartupInfoA
GetFileAttributesW
lstrcpynA
GlobalLock
CopyFileA
GetTempPathW
QueryPerformanceCounter
GetOEMCP
WideCharToMultiByte
FileTimeToSystemTime
GetModuleHandleA
GlobalFree
GetEnvironmentStringsW
SystemTimeToFileTime
GetTempFileNameA
WriteConsoleA
msvcrt
__getmainargs
__p__fmode
_XcptFilter
_except_handler3
_exit
__p___initenv
_controlfp
__p__commode
_initterm
__set_app_type
__setusermatherr
_adjust_fdiv
user32
SetClassLongA
GetPropA
SetWindowsHookExA
SystemParametersInfoA
GetWindowThreadProcessId
OffsetRect
InsertMenuItemA
GetMenuItemCount
GetMenuState
RedrawWindow
DestroyIcon
SetMenu
GetDesktopWindow
CloseClipboard
SetTimer
IsWindowVisible
LoadBitmapA
SetPropA
EnableMenuItem
GetCursorPos
CreatePopupMenu
SetScrollRange
EqualRect
DrawFrameControl
IntersectRect
GetFocus
InflateRect
RegisterClassA
GetMenu
FindWindowA
PostMessageA
SendDlgItemMessageA
IsWindow
CallWindowProcA
GetDCEx
GetIconInfo
EndPaint
GetMenuStringA
WindowFromPoint
ReleaseCapture
advapi32
RegDeleteKeyW
RegOpenKeyW
ControlService
CloseServiceHandle
CryptGenRandom
FreeSid
AllocateAndInitializeSid
RegEnumValueW
RegCreateKeyA
RegDeleteValueW
DeleteService
SetSecurityDescriptorDacl
CryptCreateHash
OpenThreadToken
SetSecurityDescriptorGroup
InitializeAcl
QueryServiceStatus
RegSetValueExW
GetLengthSid
RegQueryValueA
CheckTokenMembership
RegQueryInfoKeyW
EqualSid
RegFlushKey
InitializeSecurityDescriptor
GetTokenInformation
LookupPrivilegeValueW
RegCreateKeyExA
Sections
.text Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ