Static task
static1
Behavioral task
behavioral1
Sample
65364decd8c458bb4ff2624215cf0ec8d3ad3a6a075a0fa26063d4d3699c7415.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65364decd8c458bb4ff2624215cf0ec8d3ad3a6a075a0fa26063d4d3699c7415.exe
Resource
win10v2004-20220812-en
General
-
Target
65364decd8c458bb4ff2624215cf0ec8d3ad3a6a075a0fa26063d4d3699c7415
-
Size
790KB
-
MD5
84904076a92e6640a1e8bc20e4fc977f
-
SHA1
e97f74ca74663f07a81bde2cc739ba139ac52241
-
SHA256
65364decd8c458bb4ff2624215cf0ec8d3ad3a6a075a0fa26063d4d3699c7415
-
SHA512
98f3dc1c3069479ca3503b39a5d1901916d97cebd4725634e40798594e1633b1b68bfb797c95443d5cbf30de3c9777c61091db71c190d1b224cb7d824fb3dbcb
-
SSDEEP
24576:L1dlZo58Xxqt0bgPTSTPzQ0B0UlY+jBF6rng91333LVLnrO0t:L1dlZo8Xxqt0bgPTSTPzQ0B0WDKrng/5
Malware Config
Signatures
Files
-
65364decd8c458bb4ff2624215cf0ec8d3ad3a6a075a0fa26063d4d3699c7415.exe windows x86
18a8f1cc88bfbadd72d06bfd1a86f94c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetFileAttributesA
WaitForSingleObject
GetCurrentDirectoryA
GetPrivateProfileStringA
GetTempPathA
GetModuleFileNameA
SetCurrentDirectoryA
SetFileAttributesA
CloseHandle
GetLastError
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
WriteFile
CreateFileA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteFileA
GetStringTypeW
GetFullPathNameA
GetDriveTypeA
RtlUnwind
CreateDirectoryA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
ReadFile
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetStdHandle
FlushFileBuffers
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
LCMapStringA
LCMapStringW
GetStringTypeA
user32
GetDlgItem
SetWindowTextA
EndDialog
LoadIconA
UpdateWindow
LoadImageA
DialogBoxParamA
MessageBoxA
SendMessageA
GetWindowTextA
shell32
ShellExecuteExA
ShellExecuteA
SHGetDesktopFolder
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 180KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ