Static task
static1
Behavioral task
behavioral1
Sample
0592e30015e190cbf4e1a3c5b970ddf2340b4ac92541364127c38b70055e226b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0592e30015e190cbf4e1a3c5b970ddf2340b4ac92541364127c38b70055e226b.exe
Resource
win10v2004-20221111-en
General
-
Target
0592e30015e190cbf4e1a3c5b970ddf2340b4ac92541364127c38b70055e226b
-
Size
542KB
-
MD5
71cdb19d4759e7e0a29701c6b4049eab
-
SHA1
f68856c3daf7456f9d9de83c41f1d7cbed7bfb88
-
SHA256
0592e30015e190cbf4e1a3c5b970ddf2340b4ac92541364127c38b70055e226b
-
SHA512
782c5ea2063c3554b09d7a5649100cbe508b57a8012bb8e74b2bcf8d59c1ad372414303c1e5fbb13a6749e0154099adf5b992c9f36a24bba7e0a41c3d83a2bcf
-
SSDEEP
12288:Qmcfuqg3FMvRQ0u9AxObQWES0uRLOQ2NYgTM9kHqHxRK7ldV/G:iSMvqAQbQWWQSnjaWln
Malware Config
Signatures
Files
-
0592e30015e190cbf4e1a3c5b970ddf2340b4ac92541364127c38b70055e226b.exe windows x86
79d3ab6322d4d592578819ac4cb65f82
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetTempPathA
LoadLibraryA
WaitForSingleObject
OpenProcess
GetExitCodeProcess
CreateProcessA
CloseHandle
CreateFileA
GetFileSize
SetFilePointer
GetModuleFileNameA
ReadFile
MoveFileExA
WriteFile
DeviceIoControl
DeleteFileA
SetUnhandledExceptionFilter
SetFileTime
FileTimeToSystemTime
FlushFileBuffers
GetFileTime
GetPrivateProfileStringA
GetTempFileNameA
GetProcAddress
GetLastError
SetCurrentDirectoryA
Sleep
ExpandEnvironmentStringsA
GetCurrentProcess
VirtualFree
SetEnvironmentVariableA
CompareStringW
HeapReAlloc
SetErrorMode
ExitProcess
CreateRemoteThread
DuplicateHandle
SetEndOfFile
HeapFree
HeapAlloc
GetProcessHeap
FindClose
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LCMapStringW
MultiByteToWideChar
DeleteCriticalSection
RaiseException
GetFileType
CreateFileW
SetStdHandle
SetHandleCount
GetStdHandle
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetStringTypeW
WriteConsoleW
IsProcessorFeaturePresent
GetDriveTypeW
GetTimeZoneInformation
LoadLibraryW
GetLocaleInfoA
user32
wsprintfA
advapi32
CryptGenRandom
CryptAcquireContextA
CryptReleaseContext
shell32
ord680
ShellExecuteA
psapi
GetProcessImageFileNameA
EnumProcesses
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 452KB - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ