Static task
static1
Behavioral task
behavioral1
Sample
4b713ce18d77b354ca0a9052a3e787c7f7911cf61a40229075bb00b8cf30daf9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b713ce18d77b354ca0a9052a3e787c7f7911cf61a40229075bb00b8cf30daf9.exe
Resource
win10v2004-20220812-en
General
-
Target
4b713ce18d77b354ca0a9052a3e787c7f7911cf61a40229075bb00b8cf30daf9
-
Size
288KB
-
MD5
03a2e29cf9e319cef23f075118eacef8
-
SHA1
da6d6e8477adee2b68429c81b590654192c4c33d
-
SHA256
4b713ce18d77b354ca0a9052a3e787c7f7911cf61a40229075bb00b8cf30daf9
-
SHA512
015e8530266263282c8273ecd05bf6d24927cfd71c782fd49d2593adf6d5794558c70273f76001ec9c7727fc3f86466da0d3fa144e13a35fb06f66136c070659
-
SSDEEP
6144:TcUInsqDQJrfB3+pthadOqLVJ5bbZXegqw48gyH0YtnbvK/kFZj:YvsqDQJrp3klWJtbZU8JFtrymB
Malware Config
Signatures
Files
-
4b713ce18d77b354ca0a9052a3e787c7f7911cf61a40229075bb00b8cf30daf9.exe windows x86
0e8f98e6d42014f385ac90fbfaa6661a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
DeleteFileA
GetTempFileNameA
FlushFileBuffers
MoveFileA
WaitForSingleObject
FormatMessageA
GetModuleFileNameA
WriteFile
SetFilePointer
ReadFile
GetCurrentThread
GetLastError
GetCurrentProcess
LocalAlloc
LocalFree
LoadLibraryA
GetProcAddress
FreeLibrary
GetVersionExA
CreateFileA
CloseHandle
IsBadStringPtrA
GetSystemDirectoryA
GetStringTypeA
SetStdHandle
GetOEMCP
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetStringTypeW
user32
MessageBoxA
LoadStringA
advapi32
InitializeSecurityDescriptor
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteExA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�=� Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE