Static task
static1
Behavioral task
behavioral1
Sample
5e5d98a47371331e1373577011958034d9445ba91b17a9dc08d5bb765c0aa851.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e5d98a47371331e1373577011958034d9445ba91b17a9dc08d5bb765c0aa851.exe
Resource
win10v2004-20220812-en
General
-
Target
5e5d98a47371331e1373577011958034d9445ba91b17a9dc08d5bb765c0aa851
-
Size
332KB
-
MD5
077aef31d0313391d9ba87b090b69d36
-
SHA1
c5576ffb785177806c8971b9471896d5151ed4fb
-
SHA256
5e5d98a47371331e1373577011958034d9445ba91b17a9dc08d5bb765c0aa851
-
SHA512
1ee0297ce231ccea9ee07974dd1ee3fca970de3199457211ca616d6e96c4b708e41ac40c4b132b0c9c7587366d660e4b949ffbb65b986e6fd7583a87beee0d1d
-
SSDEEP
6144:rHRDNGAvW0/ZcSNgvD7IFUDT7dQD5qeyeo9mC9+o:rHq0hcSOv3IFUv7ds50H9N
Malware Config
Signatures
Files
-
5e5d98a47371331e1373577011958034d9445ba91b17a9dc08d5bb765c0aa851.exe windows x86
02e5daee40d2922f9c544765c1e88296
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
GlobalAlloc
MultiByteToWideChar
ReadFile
CloseHandle
WaitForSingleObject
CreateProcessA
SetHandleInformation
CreatePipe
CreateDirectoryA
GetSystemWindowsDirectoryA
FindClose
FindFirstFileA
GetModuleHandleA
InterlockedExchange
GetACP
GetLocaleInfoA
GetVersionExA
GetThreadLocale
DeleteCriticalSection
GetLongPathNameA
GetShortPathNameA
GetLastError
CreateFileA
lstrlenW
SetEnvironmentVariableW
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetTimeZoneInformation
GetModuleFileNameA
GetTickCount
LoadLibraryA
GetProcAddress
InitializeCriticalSection
FreeLibrary
LCMapStringW
LCMapStringA
FlushFileBuffers
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemInfo
VirtualProtect
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
GetFileType
GetStartupInfoA
GetCommandLineA
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetStringTypeA
GetStringTypeW
WriteFile
SetStdHandle
SetHandleCount
GetStdHandle
GetFileAttributesA
SetEndOfFile
SetFilePointer
RtlUnwind
VirtualQuery
GetOEMCP
GetCPInfo
HeapSize
GetExitCodeProcess
user32
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassA
LoadCursorA
wsprintfA
MessageBoxA
DefWindowProcA
advapi32
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyA
ole32
StringFromCLSID
CoTaskMemFree
wsock32
ntohs
listen
recv
getsockname
bind
socket
ioctlsocket
htons
connect
send
WSAGetLastError
WSAStartup
closesocket
WSAAsyncSelect
accept
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 496KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE