Static task
static1
Behavioral task
behavioral1
Sample
67ba1ee67dbaf316a584537f0e8b517ae99c256cf1ad567a91fcc24206b3d42b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
67ba1ee67dbaf316a584537f0e8b517ae99c256cf1ad567a91fcc24206b3d42b.exe
Resource
win10v2004-20221111-en
General
-
Target
67ba1ee67dbaf316a584537f0e8b517ae99c256cf1ad567a91fcc24206b3d42b
-
Size
517KB
-
MD5
7f4e8769df0ab2352626f958c6c1f8de
-
SHA1
4e2b3dea50629ee382ef9a57a0ff3c953fe33b6d
-
SHA256
67ba1ee67dbaf316a584537f0e8b517ae99c256cf1ad567a91fcc24206b3d42b
-
SHA512
d67fd3d929e1df47582eeeefa42da87f6e69a815c0cad0754478cb06c2eb7fc97d461040c55027fb2bdd8dc8a53c388d88861dfd841cf7fb0deda1e9dab5cca3
-
SSDEEP
12288:/5zT81NeZZs998W1zcELVfDcsP8H/hN1NEG:RzuNeZ50bLFDcLHZL
Malware Config
Signatures
Files
-
67ba1ee67dbaf316a584537f0e8b517ae99c256cf1ad567a91fcc24206b3d42b.exe windows x86
8ce188e416670c450b6620c925728d8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
GetVersionExA
OpenEventW
WaitForSingleObject
GetModuleHandleW
CreateDirectoryW
MoveFileW
LocalFree
LocalAlloc
DeleteFileW
EnumUILanguagesW
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
FreeLibrary
ExpandEnvironmentStringsW
CreateFileW
CloseHandle
lstrcmpW
WriteFile
LoadLibraryExW
lstrlenW
LoadLibraryW
GetProcAddress
UnhandledExceptionFilter
msvcrt
_exit
_cexit
__getmainargs
_XcptFilter
free
exit
_initterm
_amsg_exit
wcschr
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_vsnwprintf
memset
?terminate@@YAXXZ
_controlfp
shlwapi
PathFileExistsW
StrStrW
PathFindFileNameW
ord158
StrCmpNW
ord215
advapi32
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
user32
LoadStringW
GetSystemMetrics
shell32
SHSetLocalizedName
SHGetFolderPathAndSubDirW
iertutil
ord675
ord672
Sections
.text Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 139KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pqpdnsc Size: 127KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wrmpior Size: 119KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ozzudeb Size: 72KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
enaoryj Size: 4KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE