Static task
static1
Behavioral task
behavioral1
Sample
1694eec5cf2963af6a3d3489333c88731a02b4d565d71f4faaae5be95a860ec0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1694eec5cf2963af6a3d3489333c88731a02b4d565d71f4faaae5be95a860ec0.exe
Resource
win10v2004-20221111-en
General
-
Target
1694eec5cf2963af6a3d3489333c88731a02b4d565d71f4faaae5be95a860ec0
-
Size
402KB
-
MD5
a64ff9a1e9ec1d59335661793a2424ed
-
SHA1
1c68971957d004269988d6aecb338bc209b7d695
-
SHA256
1694eec5cf2963af6a3d3489333c88731a02b4d565d71f4faaae5be95a860ec0
-
SHA512
f51e902405613a5cad6b783c52761723a4d357faa756b5d6e9999a9ee8d70d777a2cd1fda557091747fd2ec576f017202f1c87def73bad361a213d8a342a0cbe
-
SSDEEP
6144:hD2oMS4QYVXawzHx9epCtIOjh3o9SEUI/Dki+0CwAPH:hNMS4rVXaqx9epCtFFo0EUAoinCwAPH
Malware Config
Signatures
Files
-
1694eec5cf2963af6a3d3489333c88731a02b4d565d71f4faaae5be95a860ec0.exe windows x86
546a9919f60a026051d60a76545597ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
user32
MessageBoxA
CharNextW
LoadStringW
CreateWindowExW
TranslateMessage
RegisterClassExW
PostQuitMessage
PostMessageW
MessageBoxW
LoadStringW
GetSystemMetrics
GetMessageW
DispatchMessageW
DestroyWindow
DefWindowProcW
CharUpperBuffW
CharUpperW
kernel32
Sleep
VirtualFree
VirtualAlloc
lstrlenW
VirtualQuery
QueryPerformanceCounter
GetTickCount
GetSystemInfo
GetVersion
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQuery
VerSetConditionMask
VerifyVersionInfoW
SuspendThread
Sleep
SetThreadPriority
SetFilePointer
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
ReadFile
QueryPerformanceFrequency
QueryPerformanceCounter
LocalFree
LoadLibraryW
LeaveCriticalSection
IsValidLocale
InitializeCriticalSection
GetVersionExW
GetTimeZoneInformation
GetTickCount
GetThreadPriority
GetThreadLocale
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileAttributesW
GetDiskFreeSpaceW
GetDateFormatW
GetCPInfoExW
GetCPInfo
GetACP
FreeLibrary
FormatMessageW
FindFirstFileW
FindClose
EnumCalendarInfoW
EnterCriticalSection
DeleteCriticalSection
CreateFileW
CreateEventW
CompareStringW
CloseHandle
shell32
ShellExecuteW
wsock32
WSACleanup
WSAStartup
Sections
.text Size: 366KB - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 22KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didata Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ