Static task
static1
Behavioral task
behavioral1
Sample
5e93cf6dfeb9498303a6898ab19e314892c273d24f367beb1214b373617c609f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5e93cf6dfeb9498303a6898ab19e314892c273d24f367beb1214b373617c609f.exe
Resource
win10v2004-20221111-en
General
-
Target
5e93cf6dfeb9498303a6898ab19e314892c273d24f367beb1214b373617c609f
-
Size
402KB
-
MD5
34df3350990db52152f3b2bfe5bbc2b0
-
SHA1
5e96ae00f2fca4d19486acea567fe8e9975268bc
-
SHA256
5e93cf6dfeb9498303a6898ab19e314892c273d24f367beb1214b373617c609f
-
SHA512
97d75dfac3b928c538778877410e5eacfcbaca678378e2930c6bddcea8282af38c3fabffccb3b1a4736c4e4a1ccc9eb8650f617e26e58f234b7cab28c5ede8fe
-
SSDEEP
6144:E7P8uOI3qltFiiBQe6ffu+X2O9ZV6MozY6tNYsbw4FzoXB71mQBPrpjGhOiwj4:S0vhiiCjG+X2O9ZV6/+SoR71Goiwk
Malware Config
Signatures
Files
-
5e93cf6dfeb9498303a6898ab19e314892c273d24f367beb1214b373617c609f.exe windows x86
6b86efa15a9d43ea41bf9bcb5e1697ff
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteProcessMemory
WritePrivateProfileStringA
WriteFile
WinExec
WaitForSingleObject
VirtualFree
VirtualAlloc
Sleep
SizeofResource
SetLocalTime
SetLastError
SetFileAttributesA
ResumeThread
OpenProcess
LockResource
LoadResource
GetSystemDirectoryA
GetProcAddress
GetPrivateProfileStringA
GetPriorityClass
GetModuleHandleA
GetLocalTime
GetLastError
GetCurrentProcessId
GetCurrentProcess
FindResourceA
DeleteFileA
CreateThread
CreateRemoteThread
CreateProcessA
CreateFileA
CopyFileA
CompareStringA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
user32
GetKeyboardType
MessageBoxA
CharNextA
SetForegroundWindow
SetCursorPos
SetActiveWindow
SendMessageA
GetWindowThreadProcessId
GetWindowRect
GetWindow
GetForegroundWindow
GetClassNameA
GetActiveWindow
FindWindowExA
FindWindowA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
oleaut32
SysFreeString
shlwapi
PathFileExistsA
Sections
��� �4�� Size: 398KB - Virtual size: 398KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE