Static task
static1
Behavioral task
behavioral1
Sample
f22f2d3fa42ff86097d30f49ddb0bfbee7f02a6695e8c46083a731dba4e241b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f22f2d3fa42ff86097d30f49ddb0bfbee7f02a6695e8c46083a731dba4e241b1.exe
Resource
win10v2004-20221111-en
General
-
Target
f22f2d3fa42ff86097d30f49ddb0bfbee7f02a6695e8c46083a731dba4e241b1
-
Size
125KB
-
MD5
42b327061b14ca7d59c162838355e547
-
SHA1
1b60c85b54fea626b844bc6d3de6dcbffcc35791
-
SHA256
f22f2d3fa42ff86097d30f49ddb0bfbee7f02a6695e8c46083a731dba4e241b1
-
SHA512
4e51443d8b4f02e1e8662ba03f1d27499948bd930f682248cead9f9638b17f42365a116180ce992b072d51bd6420f2d86e3462641939d80967f0d3bda819a101
-
SSDEEP
3072:3oby5dqm+0aM2rUdc+YPHGlpCnrvMFyrG+4JJTAo:Pr25PPHGlIrvIya9
Malware Config
Signatures
Files
-
f22f2d3fa42ff86097d30f49ddb0bfbee7f02a6695e8c46083a731dba4e241b1.exe windows x86
ada6f0b64abf2487609beab8a411fd4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatW
GetWindowsDirectoryW
CreateFileW
VirtualAlloc
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleFileNameW
GetModuleHandleW
SetErrorMode
GetCommandLineW
VirtualQuery
GetSystemInfo
VirtualProtect
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
InitializeCriticalSection
HeapReAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
lstrcmpiA
FindClose
FindNextFileA
FindFirstFileA
CloseHandle
GetLocalTime
lstrlenA
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileA
GetDiskFreeSpaceA
CreateDirectoryA
SystemTimeToFileTime
GetSystemTime
DeleteFileA
lstrcmpA
ReleaseMutex
WaitForSingleObject
CreateMutexA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
InterlockedExchange
IsDBCSLeadByteEx
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SetUnhandledExceptionFilter
user32
GetSystemMetrics
LoadCursorW
GetSysColor
RegisterClassW
CreateWindowExW
DefWindowProcW
LoadIconW
DestroyWindow
SetFocus
CheckDlgButton
SetForegroundWindow
EndDialog
IsDlgButtonChecked
DialogBoxParamA
MessageBoxA
ShowWindow
CreateDialogParamA
GetDesktopWindow
IsDialogMessageA
TranslateMessage
PeekMessageA
LoadStringA
GetDlgItem
SendMessageA
SetDlgItemTextA
CharPrevA
SetWindowPos
OffsetRect
DispatchMessageA
SystemParametersInfoA
GetParent
GetWindowRect
gdi32
GetStockObject
advapi32
RegOpenKeyExW
RegSetValueExA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegOverridePredefKey
RegOpenKeyA
shell32
ExtractIconExW
CommandLineToArgvW
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
PathQuoteSpacesW
StrCmpW
StrToIntW
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text2 Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ