Static task
static1
Behavioral task
behavioral1
Sample
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174.exe
Resource
win10v2004-20221111-en
General
-
Target
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174
-
Size
73KB
-
MD5
5eb1cb0f72c076b517fc80523efb7fe0
-
SHA1
392d1532a8b228784fab0340e3f8afb20ea14e7e
-
SHA256
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174
-
SHA512
fb2b6be0f754f0b881c33a5b37c785ea5d2b20f51d7840fcbb61d4166037804b008f346bed036812f4588aee483c7dbc0408c06bbbcf449496b4435c04ae44fe
-
SSDEEP
768:2OqYhhncSR7NWfZFfaLWO169V5VvHZ3m11ahpXl5TKgC10LscDf741lL:2Cfcmc/iL116JFHZLx5TKV0LsO741lL
Malware Config
Signatures
Files
-
66222fa06152af900d939e4889ec3afd9b4a13b6089ba62fddda4c2e0f25c174.exe windows x86
7ec245a52e4630241789c8a6e5859e9b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetProcessHeap
GetCommandLineA
GetConsoleCP
lstrlenW
FlushInstructionCache
GetLastError
OpenMutexA
GetModuleFileNameA
IsDebuggerPresent
OutputDebugStringA
GetVersion
GetTempPathA
GetSystemTime
OutputDebugStringW
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetComputerNameW
GetCurrentProcess
GetCPInfo
GetCommandLineW
HeapAlloc
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
user32
GetWindowTextLengthW
GetWindowRect
IsIconic
IsZoomed
LoadCursorW
GetForegroundWindow
GetWindowTextA
GetWindowLongW
IsWindowUnicode
GetDesktopWindow
GetCursorPos
LoadBitmapW
IsWindowVisible
GetProcessDefaultLayout
advapi32
RegOpenKeyExW
RegOpenKeyExA
GetUserNameW
GetUserNameA
Sections
������� Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 256B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsr Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ