Static task
static1
Behavioral task
behavioral1
Sample
20019a7f148cb6e6387c458d1a01fb9faa75efa10bfaf6f54476b8a7c429ebb5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
20019a7f148cb6e6387c458d1a01fb9faa75efa10bfaf6f54476b8a7c429ebb5.exe
Resource
win10v2004-20221111-en
General
-
Target
20019a7f148cb6e6387c458d1a01fb9faa75efa10bfaf6f54476b8a7c429ebb5
-
Size
908KB
-
MD5
f301fe71b23d0002bd3bb52f09122e82
-
SHA1
8cfb8661bdabbfb4fb2758acd95b08e5494992bf
-
SHA256
20019a7f148cb6e6387c458d1a01fb9faa75efa10bfaf6f54476b8a7c429ebb5
-
SHA512
32491e625b511d8c9223111486aa62abed91c418469ec36c0811ef7619099a78296d1588d9030d0cf88acc090296c44aee03f7d1e156a976e0c555f5a3b52973
-
SSDEEP
12288:SwKjkpTY7YIAK/f5YX5ZOwl9lz4CG5DUI0pYk28GjQmzT04:qkp2YIr091rGGI0p92HjQmn0
Malware Config
Signatures
Files
-
20019a7f148cb6e6387c458d1a01fb9faa75efa10bfaf6f54476b8a7c429ebb5.exe windows x86
02f18b3a26350ff89a997a8c44703df9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetThreadLocale
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LocalAlloc
LocalFree
MoveFileExW
MultiByteToWideChar
GetProcessHeap
RaiseException
ReleaseMutex
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetThreadExecutionState
SetThreadLocale
Sleep
WaitForMultipleObjects
WideCharToMultiByte
WriteFile
lstrcmpW
lstrcpyA
lstrlenA
GetModuleHandleW
VirtualAllocEx
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetCurrentThreadId
GetComputerNameW
FormatMessageW
FormatMessageA
ExitProcess
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateProcessW
CreateMutexA
CreateFileA
CreateEventA
OutputDebugStringW
CloseHandle
user32
SetTimer
SetWindowTextW
LoadIconA
LoadIconW
SetFocus
SetCursor
SendMessageW
PostMessageW
MessageBoxW
MessageBoxA
MapDialogRect
LoadCursorW
KillTimer
GetWindowTextW
GetWindowRect
GetForegroundWindow
GetDlgItem
EndDialog
DialogBoxParamW
CharLowerW
SetForegroundWindow
gdi32
GetTextMetricsW
GetTextExtentPointW
DeleteDC
SelectObject
CreateDCW
advapi32
RegOpenKeyA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
GetUserNameW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExA
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_abnormal_termination
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_iob
_mbscmp
_mbscpy
_mbsicmp
_mbsinc
_mbslwr
_mbsnbcmp
_mbsnbicmp
_snwprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
exit
fwprintf
iswctype
memmove
setlocale
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsrchr
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 827KB - Virtual size: 827KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aa Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ