Static task
static1
Behavioral task
behavioral1
Sample
83d569244e23ca76ced141c9de562ca125188849bcc0a227f1e7574b7da8984d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
83d569244e23ca76ced141c9de562ca125188849bcc0a227f1e7574b7da8984d.exe
Resource
win10v2004-20220901-en
General
-
Target
83d569244e23ca76ced141c9de562ca125188849bcc0a227f1e7574b7da8984d
-
Size
96KB
-
MD5
0230cb570e2b87a28d2b693be96b57fa
-
SHA1
7bcc99bcc9603ba95bc0c3ddb6291fd655573d20
-
SHA256
83d569244e23ca76ced141c9de562ca125188849bcc0a227f1e7574b7da8984d
-
SHA512
f180bb76f126848fdde538c141fb50ffe8dc693dc7db72ae5ba5a5320dd3e3d4d9082d169bbfcc15b2c3a8b2af1f2426427920a35a10d1fb7c96e5d7540659d7
-
SSDEEP
1536:wm3t5SJ2ZKGpXVyPI3ooPl5yd3AiijKU2M3lro6yxyfh7:wm33hHSKfPl5yhAi6dlrorg
Malware Config
Signatures
Files
-
83d569244e23ca76ced141c9de562ca125188849bcc0a227f1e7574b7da8984d.exe windows x86
12305f2cea23ef0cccdc6294f7b23a84
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegQueryValueExW
RegQueryValueA
RegCreateKeyExA
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExA
RegOpenKeyExW
kernel32
DeleteFileA
GetVersionExA
FormatMessageA
GetLastError
GetSystemDirectoryA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
lstrlenW
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
GetProcAddress
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
ExitProcess
GetModuleHandleA
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
CloseHandle
FlushFileBuffers
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
SetStdHandle
CreateFileA
CompareStringA
MultiByteToWideChar
CompareStringW
SetEnvironmentVariableA
ReadFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetEndOfFile
GetProcessHeap
GetLocaleInfoA
VirtualProtect
GetSystemInfo
SetLastError
FlushInstructionCache
user32
MessageBoxA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kduczvk Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE