Static task
static1
Behavioral task
behavioral1
Sample
f679a8db4dbfde04f3931d943ee3285b763583226256e60f56a90bf03b0e6096.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f679a8db4dbfde04f3931d943ee3285b763583226256e60f56a90bf03b0e6096.exe
Resource
win10v2004-20220812-en
General
-
Target
f679a8db4dbfde04f3931d943ee3285b763583226256e60f56a90bf03b0e6096
-
Size
280KB
-
MD5
445a570fd34511d15f7a88001f196940
-
SHA1
da5612e6cca977f900e85ce75cad3bf398a23903
-
SHA256
f679a8db4dbfde04f3931d943ee3285b763583226256e60f56a90bf03b0e6096
-
SHA512
3689f3fd337d39adcf3cc7f90daaf3733d0c3738719018ec2b48790384c99963763cd76ae4526e9326b50db22c12942f3495a4b010d51fa3169934d028948120
-
SSDEEP
6144:N6MyLbMuYDA1dNv98c4e+bVkY/6dCrtMh2Jvd:YMy3MuxnlMrCdOMQ
Malware Config
Signatures
Files
-
f679a8db4dbfde04f3931d943ee3285b763583226256e60f56a90bf03b0e6096.exe windows x86
aa8726ee364bb7abec54c863427d0cae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryExA
UnhandledExceptionFilter
SetConsoleCursorPosition
GlobalReAlloc
EnumDateFormatsW
WriteConsoleOutputCharacterA
CreateMutexA
CreateDirectoryA
FormatMessageW
ScrollConsoleScreenBufferA
GetSystemDefaultLangID
FindFirstFileA
lstrcmpiA
CreateFileW
FatalAppExitA
_llseek
VirtualQuery
PeekConsoleInputW
LoadResource
RemoveDirectoryW
GetSystemTimeAdjustment
SetHandleCount
PrepareTape
FindResourceExA
SetConsoleMode
RaiseException
FlushConsoleInputBuffer
FindNextChangeNotification
ReleaseSemaphore
SetProcessAffinityMask
GetFileInformationByHandle
VirtualFree
GlobalUnlock
GetTickCount
ReadFile
GetACP
Beep
GetCurrentDirectoryW
SwitchToFiber
EndUpdateResourceA
InitializeCriticalSection
SetMailslotInfo
FindFirstFileW
GlobalFlags
GetCompressedFileSizeW
IsValidLocale
VirtualAlloc
GetBinaryTypeW
GetTempPathW
GetStartupInfoA
GetPrivateProfileSectionW
_lclose
GetCurrentProcess
GetStringTypeExW
ReadConsoleA
CreatePipe
VirtualProtect
SetCommMask
OutputDebugStringW
CompareStringW
PeekNamedPipe
ReadConsoleInputW
SetProcessWorkingSetSize
SetVolumeLabelA
WritePrivateProfileStructA
GetDiskFreeSpaceExA
GetSystemInfo
GetAtomNameA
OutputDebugStringA
GetModuleHandleA
SetFileAttributesA
DeleteFiber
LoadLibraryExW
FindFirstFileExW
DuplicateHandle
SetConsoleTitleA
SetThreadPriorityBoost
FreeLibrary
GetConsoleCursorInfo
SetEndOfFile
AreFileApisANSI
SetupComm
GetVersion
CreateWaitableTimerA
IsBadWritePtr
LocalFileTimeToFileTime
FormatMessageA
user32
HiliteMenuItem
ValidateRect
LockWindowUpdate
CreateMDIWindowW
ModifyMenuA
wvsprintfA
ToUnicodeEx
SetPropW
DrawMenuBar
CreatePopupMenu
EnumDisplayDevicesA
CharPrevW
SetCaretBlinkTime
CopyRect
GetDlgItem
CreateWindowExW
GetMenuInfo
UnregisterHotKey
SendNotifyMessageW
SetParent
DrawAnimatedRects
ShowWindowAsync
EndDeferWindowPos
GetUserObjectSecurity
ShowWindow
OpenClipboard
EnumWindowStationsW
GetMonitorInfoA
EndDialog
GetUpdateRect
GetDesktopWindow
GetClassLongW
UpdateWindow
UnregisterDeviceNotification
GetScrollInfo
GetWindowThreadProcessId
EnableMenuItem
GetScrollPos
SetMenu
TileWindows
FindWindowW
CreateIcon
ActivateKeyboardLayout
gdi32
GetCharWidth32W
CreateDIBPatternBrushPt
SetPixelFormat
GetTextExtentPointW
RemoveFontResourceA
GetDCOrgEx
SetViewportOrgEx
CreateICW
PolyBezierTo
SetTextColor
CopyEnhMetaFileA
SetWinMetaFileBits
SetBkColor
comdlg32
PrintDlgW
ReplaceTextA
advapi32
ImpersonateNamedPipeClient
IsTextUnicode
SetThreadToken
RegFlushKey
RegRestoreKeyW
LookupAccountSidW
RegDeleteValueW
GetTokenInformation
GetNamedSecurityInfoA
DeregisterEventSource
GetSecurityDescriptorLength
CryptDeriveKey
oleaut32
SafeArrayCreate
LoadTypeLibEx
QueryPathOfRegTypeLi
comctl32
ImageList_Merge
shlwapi
PathCompactPathExW
StrToIntW
StrChrA
PathIsDirectoryA
PathCanonicalizeW
SHRegSetUSValueW
PathUndecorateW
SHRegCloseUSKey
UrlIsW
wvnsprintfW
PathIsFileSpecW
StrCpyW
PathRemoveBlanksA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE