Static task
static1
Behavioral task
behavioral1
Sample
5a15550f5013c46137713e627d77554321a34bdde6bbf5c3015ae453e8bcbeaf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5a15550f5013c46137713e627d77554321a34bdde6bbf5c3015ae453e8bcbeaf.exe
Resource
win10v2004-20220901-en
General
-
Target
5a15550f5013c46137713e627d77554321a34bdde6bbf5c3015ae453e8bcbeaf
-
Size
308KB
-
MD5
23f3482180b731c7bee6042242e2e458
-
SHA1
b065e4ded8b2fdeee1b635b65419be0650b57f03
-
SHA256
5a15550f5013c46137713e627d77554321a34bdde6bbf5c3015ae453e8bcbeaf
-
SHA512
97f10dc3f73cc0c641050ff65e2b164ff02887b9a0121e4df2b98aff7f496740ad2682a757ef4cfc4ff141813fb70af0b60ef7d267faf630920eb9fe51917bab
-
SSDEEP
3072:eggavhv5Xy3Z20E2PScX4X+NQuIMGAbry/N21Tt20LsUIvtJw:AghRXy3ZlE2KI4HJzw
Malware Config
Signatures
Files
-
5a15550f5013c46137713e627d77554321a34bdde6bbf5c3015ae453e8bcbeaf.exe windows x86
b20486ed28b4c2a0415acf957752d375
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
FindFirstFileA
GetDriveTypeA
FindNextFileA
FindClose
GetACP
GetVersionExA
GetLocaleInfoA
SetFileAttributesA
GetCurrentProcessId
GetTickCount
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCurrentProcess
GetComputerNameW
GetProcessHeap
DeviceIoControl
InitializeCriticalSection
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
QueryPerformanceCounter
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
RaiseException
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FlushFileBuffers
SetEndOfFile
CreateFileA
Sleep
GetVersion
TerminateProcess
DeleteFileA
SetFileTime
GetFileTime
GetSystemDirectoryA
ReadFile
GetFileSize
GetLastError
WriteFile
SetFilePointer
CloseHandle
WaitForSingleObject
CreateSemaphoreA
FreeLibrary
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
GetSystemTimeAsFileTime
HeapCreate
HeapFree
HeapAlloc
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringA
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
user32
GetMessageA
wsprintfA
LoadStringA
TranslateMessage
DispatchMessageA
GetForegroundWindow
EnumDisplaySettingsA
GetKeyboardLayout
MapVirtualKeyExA
MapVirtualKeyA
wsprintfW
GetKeyNameTextA
advapi32
GetUserNameA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
SysAllocStringLen
VariantInit
VariantClear
SysAllocString
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ