Static task
static1
Behavioral task
behavioral1
Sample
0fd091e682fc8665c6f17077fca40e6f0bfc4be50d37a1bd0e9247ca7497becc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0fd091e682fc8665c6f17077fca40e6f0bfc4be50d37a1bd0e9247ca7497becc.exe
Resource
win10v2004-20220812-en
General
-
Target
0fd091e682fc8665c6f17077fca40e6f0bfc4be50d37a1bd0e9247ca7497becc
-
Size
88KB
-
MD5
601e5e0a25bc6a2752d12fa4694f4713
-
SHA1
b74bf7139d526c6615e39e87588f08050ce9dca9
-
SHA256
0fd091e682fc8665c6f17077fca40e6f0bfc4be50d37a1bd0e9247ca7497becc
-
SHA512
a17d514af5e9b5de48ee2452a40230833df1d41201da4f6f2ae2e1c0e1c48c4ecf501edd3ea9068b4a05bb3678661c1db8fd827a955ff7213efb0398b8369fcc
-
SSDEEP
1536:KGQHNWCzkX4rvBno3YcXvC3JfE1Zp7HCCxDum9JhGmcEzns/E:KfHgborvBno3rPljl5uAlzn8E
Malware Config
Signatures
Files
-
0fd091e682fc8665c6f17077fca40e6f0bfc4be50d37a1bd0e9247ca7497becc.exe windows x86
5e5cea0fedea98022c09f2f6afd59c87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
CreateFileA
MultiByteToWideChar
SetFilePointer
FlushFileBuffers
LoadLibraryA
GetProcAddress
GetOEMCP
DeleteFileA
CreateProcessA
LCMapStringA
GetLastError
GetACP
GetCPInfo
WriteFile
RtlUnwind
HeapFree
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
GetCommandLineA
GetVersion
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
CloseHandle
user32
EnumThreadWindows
GetWindowThreadProcessId
FindWindowA
GetWindowTextA
GetClassNameA
GetDlgItemTextA
SendMessageA
IsWindowEnabled
IsWindow
EnumWindows
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
afaizlq Size: 44KB - Virtual size: 84KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE