Static task
static1
Behavioral task
behavioral1
Sample
51e5b017c77b8b6f13a7ec27f30fb8acbd0fcbcf3307acb57a5d298cb4098f98.exe
Resource
win7-20221111-en
General
-
Target
51e5b017c77b8b6f13a7ec27f30fb8acbd0fcbcf3307acb57a5d298cb4098f98
-
Size
708KB
-
MD5
20c028966992862fb6cda34813f53560
-
SHA1
f4476bab0235448a04394a9edc865bd820450b67
-
SHA256
51e5b017c77b8b6f13a7ec27f30fb8acbd0fcbcf3307acb57a5d298cb4098f98
-
SHA512
8acf83b073ec690664714a48128886b8b2b91734b4ff1ed1ae276284930d07ca19077cbcbec7a601b5a1442e27a3c70fa1b6b5f13b38a5f993382bf2a8808803
-
SSDEEP
12288:FiFvi8xtU8lJXGRC7mJTb4txQUpdKhLvvJ8Q7iUPIfsxzcjVOaRie:cFviU6g7mJpUT
Malware Config
Signatures
Files
-
51e5b017c77b8b6f13a7ec27f30fb8acbd0fcbcf3307acb57a5d298cb4098f98.exe windows x86
ad3ef554f2f7e66e46e1994e3591d9a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileA
FindFirstFileA
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
LocalFree
GetPrivateProfileIntA
GetEnvironmentVariableA
GetVersionExA
WritePrivateProfileStringA
GetLastError
GetPrivateProfileStringA
WaitForSingleObject
RaiseException
InterlockedDecrement
lstrcmpiA
SetEvent
FindClose
CreateEventA
InterlockedIncrement
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
Sleep
GetCurrentThreadId
GetCommandLineA
ReleaseMutex
OpenMutexA
OpenEventA
GetTickCount
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlushFileBuffers
lstrlenA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
GetTempPathA
DeleteCriticalSection
QueryPerformanceCounter
WriteFile
OutputDebugStringA
CreateFileA
SetFilePointer
GetModuleHandleA
GetModuleFileNameA
EnterCriticalSection
CloseHandle
CreateThread
LeaveCriticalSection
SetEnvironmentVariableA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStringTypeW
GetStringTypeA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
GetStdHandle
ExitProcess
HeapCreate
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetSystemTimeAsFileTime
RtlUnwind
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapFree
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetProcessHeap
GetStartupInfoA
GetTimeZoneInformation
GetCPInfo
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
VirtualFree
HeapDestroy
GetCurrentProcessId
user32
CharNextA
UnregisterClassA
PostThreadMessageA
GetMessageA
DispatchMessageA
MessageBoxA
advapi32
RegQueryInfoKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegEnumKeyExA
ole32
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoUninitialize
CoTaskMemAlloc
CoInitialize
oleaut32
LoadRegTypeLi
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
VariantClear
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp1 Size: 540KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE