Static task
static1
Behavioral task
behavioral1
Sample
1e2892c1a0c1f1e747519fec2d92ecfd1b0d7347ae66b11b4d7986cf9aee3659.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1e2892c1a0c1f1e747519fec2d92ecfd1b0d7347ae66b11b4d7986cf9aee3659.exe
Resource
win10v2004-20220812-en
General
-
Target
1e2892c1a0c1f1e747519fec2d92ecfd1b0d7347ae66b11b4d7986cf9aee3659
-
Size
511KB
-
MD5
20886eb30dd6007dcf765a1f012779d0
-
SHA1
c3ac6d47e2242d800fd7092d119e1fc9090cc0a5
-
SHA256
1e2892c1a0c1f1e747519fec2d92ecfd1b0d7347ae66b11b4d7986cf9aee3659
-
SHA512
67742606772b0ae77c7cedfefa30c464152839b645ba8760954b1da790c173c8c024cc87b5e56da1246e73b706a3a3432e84c5049645020bd79efd6684b6ae0d
-
SSDEEP
12288:wT17DxoaSKpN6r0iVcH9h7AMq4+H0WYw1stXO4HoPaG+:wT1fx0KpNGJcdh7AMPWYw1epoPaG+
Malware Config
Signatures
Files
-
1e2892c1a0c1f1e747519fec2d92ecfd1b0d7347ae66b11b4d7986cf9aee3659.exe windows x86
b3ccf61aa77a0114c8358064e0e025f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharPrevExA
CharPrevA
CharUpperW
CharNextA
CharUpperA
oleaut32
VariantCopy
VariantClear
SysAllocString
SysFreeString
kernel32
FileTimeToSystemTime
CompareFileTime
GetStringTypeW
GetStringTypeA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
VirtualAlloc
VirtualFree
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
SetFileAttributesA
SetFileAttributesW
RemoveDirectoryA
RemoveDirectoryW
MoveFileA
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SearchPathA
SearchPathW
GetTempPathA
GetTempPathW
GetTempFileNameA
GetTempFileNameW
FindClose
FindFirstFileA
FindFirstFileW
SetLastError
FindNextFileA
FindNextFileW
CreateFileA
CreateFileW
CloseHandle
GetFileSize
SetFilePointer
ReadFile
SetFileTime
WriteFile
SetEndOfFile
LCMapStringA
LCMapStringW
CreateEventA
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
WaitForSingleObject
WaitForMultipleObjects
OpenEventA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetProcAddress
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
CreateThread
DeleteCriticalSection
InitializeCriticalSection
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetTickCount
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetCommandLineA
GetVersion
ExitProcess
SetUnhandledExceptionFilter
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
SetHandleCount
GetFileType
GetStartupInfoA
TerminateProcess
GetCurrentProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
SetStdHandle
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
Sections
.text Size: 402KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ