Static task
static1
Behavioral task
behavioral1
Sample
f4cff3340382d156109172223c5068bb656bacf5612a22f4c34d431c07530b9b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4cff3340382d156109172223c5068bb656bacf5612a22f4c34d431c07530b9b.exe
Resource
win10v2004-20220812-en
General
-
Target
f4cff3340382d156109172223c5068bb656bacf5612a22f4c34d431c07530b9b
-
Size
53KB
-
MD5
0fe41f93f0e4a84580d0e47a418f9586
-
SHA1
7336167e4e6c0d16d6031d58db8550f7ec7d5d02
-
SHA256
f4cff3340382d156109172223c5068bb656bacf5612a22f4c34d431c07530b9b
-
SHA512
abe51195900a8e69a31283eb0c19fc3f0a6add76fa0f2ede58ac154886e0e4e478cd8613837dba232a67b7d8ceada8ca1256c29c4d06f723ffa7f141d1a70ecd
-
SSDEEP
768:4r6tuU2xd/uSZEa9RIL56rBXayPYjzec8BMMPgcExPdBy2WADSUGIckhAR:4r6Mxjua+56rYGGQyMPqHxDSUGtkaR
Malware Config
Signatures
Files
-
f4cff3340382d156109172223c5068bb656bacf5612a22f4c34d431c07530b9b.exe windows x86
93fac2721a831a46174b9afde4768628
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrStrIA
netapi32
NetUserGetInfo
kernel32
GetTempPathA
CreateFileA
WriteFile
GetSystemDirectoryA
lstrcatA
GetModuleFileNameA
lstrlenA
MapViewOfFile
UnmapViewOfFile
WaitForSingleObject
CreateRemoteThread
GetProcAddress
CreateFileMappingA
GetExitCodeThread
GetModuleHandleA
GetCurrentProcessId
VirtualAlloc
FindResourceA
FreeResource
LoadResource
GetVersion
LockResource
GetSystemDirectoryW
GetExitCodeProcess
MultiByteToWideChar
GetLastError
OpenMutexA
lstrcatW
CreateMutexA
lstrcpyW
DeleteFileA
lstrcpyA
ExitProcess
Sleep
LoadLibraryA
GetShortPathNameA
CloseHandle
GetVolumeInformationA
OpenProcess
GetTickCount
GetCurrentProcess
VirtualFree
SizeofResource
user32
wsprintfA
GetWindowThreadProcessId
FindWindowA
advapi32
RegQueryValueExA
RegSetValueExA
InitiateSystemShutdownExA
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyA
RegCloseKey
GetTokenInformation
LookupPrivilegeValueA
GetUserNameW
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
oyseuad Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE