Static task
static1
Behavioral task
behavioral1
Sample
f4370e2a5ce043a15fac848bf8c1f34854d64bfdc0193e04f5a34607182e5b79.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4370e2a5ce043a15fac848bf8c1f34854d64bfdc0193e04f5a34607182e5b79.exe
Resource
win10v2004-20221111-en
General
-
Target
f4370e2a5ce043a15fac848bf8c1f34854d64bfdc0193e04f5a34607182e5b79
-
Size
928KB
-
MD5
2ff250dc22f69547dc13d2c49614671a
-
SHA1
4ce655dfc0bd4660032551f3db68ddaf9ab4f607
-
SHA256
f4370e2a5ce043a15fac848bf8c1f34854d64bfdc0193e04f5a34607182e5b79
-
SHA512
3b5e20da7b868b950c6f465dce671d128a6f5d12982931b3a86449cc70ceda5631b88a378e767dc6e4d13788506a9abdf41c19b7871e9f0f3b05af9ce820e17a
-
SSDEEP
24576:I0BG9gGUvH+uSLuvtXUp92iwiwu3/6bfOs:I0PGAeFuvtXi92iwiw+K
Malware Config
Signatures
Files
-
f4370e2a5ce043a15fac848bf8c1f34854d64bfdc0193e04f5a34607182e5b79.exe windows x86
bfffefca6535afcc9bd6b5d20058c57e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
WaitForSingleObject
GetCurrentDirectoryW
SetEndOfFile
GetStringTypeW
GetStringTypeA
LoadLibraryA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetCPInfo
CreateProcessA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
SetStdHandle
IsBadWritePtr
VirtualAlloc
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetProcAddress
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
WideCharToMultiByte
HeapFree
HeapSize
GetLastError
SetFileTime
LocalFileTimeToFileTime
GetFullPathNameW
GetFullPathNameA
GetTempPathW
GetTempPathA
GetModuleFileNameW
DeleteFileW
DeleteFileA
SetFilePointer
GetFileAttributesW
CreateDirectoryW
SetCurrentDirectoryW
SetCurrentDirectoryA
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
CreateFileA
Sleep
GetTickCount
GetACP
GetOEMCP
GetComputerNameW
FormatMessageA
GetModuleFileNameA
CloseHandle
ReadFile
WriteFile
GetFileSize
FileTimeToSystemTime
SystemTimeToFileTime
GetLocalTime
GetVersionExA
CreateFileW
GetCurrentThreadId
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
GetTimeZoneInformation
HeapReAlloc
HeapAlloc
GetExitCodeProcess
user32
PostMessageA
SetTimer
GetDlgItemTextA
LoadStringA
DefWindowProcA
DestroyWindow
BeginPaint
EndPaint
GetDlgItemTextW
SetWindowTextW
MoveWindow
SetDlgItemTextW
EnableWindow
EndDialog
PostQuitMessage
MessageBoxW
GetDlgItem
SendMessageA
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
CreateWindowExW
DialogBoxParamW
LoadCursorA
RegisterClassExW
LoadStringW
GetMessageA
TranslateMessage
DispatchMessageA
MessageBoxA
SetDlgItemTextA
shell32
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
advapi32
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
GetUserNameA
Sections
.text Size: 236KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ