Static task
static1
Behavioral task
behavioral1
Sample
230dac5d01c8ec35920ba9b9710e5a6061bf1e6558882ea5e5c38f8c219634a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
230dac5d01c8ec35920ba9b9710e5a6061bf1e6558882ea5e5c38f8c219634a9.exe
Resource
win10v2004-20221111-en
General
-
Target
230dac5d01c8ec35920ba9b9710e5a6061bf1e6558882ea5e5c38f8c219634a9
-
Size
108KB
-
MD5
a5279f8508800e451193b3d65e3b3067
-
SHA1
38cd1454e613e0ac33d0bfa0a18729680917cd50
-
SHA256
230dac5d01c8ec35920ba9b9710e5a6061bf1e6558882ea5e5c38f8c219634a9
-
SHA512
fef92281e0ac4ff4c9f7e82f63d7eec6fae37fb3bc39143ec8e3c3db33affa1cbdacf3031539549f06305968666bd8a3efba16ab7c540be7813a51279bd80d26
-
SSDEEP
1536:uctG158NfoCV/PwGeTWSSEW5o7MPJnoPIINxHvTrUKOXxVnpAi:Myo+3wGuW5HPJnovvAVp7
Malware Config
Signatures
Files
-
230dac5d01c8ec35920ba9b9710e5a6061bf1e6558882ea5e5c38f8c219634a9.exe windows x86
9de2bff53bea9b4bb82b64c9457e2f5a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
GetFileSize
WriteFile
LockResource
SizeofResource
LoadResource
FindResourceA
CreateFileA
GetModuleFileNameA
GetVersionExA
GetEnvironmentVariableA
lstrcatA
lstrcpyA
GetShortPathNameA
GetLongPathNameA
GetCurrentProcess
GetProcAddress
GetModuleHandleA
GetTickCount
CopyFileA
GetSystemDirectoryA
EnterCriticalSection
LoadLibraryA
GetCurrentProcessId
Sleep
CreateProcessA
MultiByteToWideChar
AreFileApisANSI
ExitProcess
MoveFileExA
CreateThread
InitializeCriticalSection
GetStringTypeA
LCMapStringW
LCMapStringA
GetStringTypeW
CreateToolhelp32Snapshot
Process32First
OpenProcess
CloseHandle
lstrcmpiA
TerminateProcess
LeaveCriticalSection
Process32Next
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
user32
wsprintfA
advapi32
RegOpenKeyExA
RegEnumValueA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationA
SHGetSpecialFolderPathA
ShellExecuteA
shlwapi
PathRemoveFileSpecA
PathFileExistsA
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ