Static task
static1
Behavioral task
behavioral1
Sample
686df0ad4cc11e15e7e37262f3ba55505a7ed244316ddb82c57d75f81f8e472e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
686df0ad4cc11e15e7e37262f3ba55505a7ed244316ddb82c57d75f81f8e472e.exe
Resource
win10v2004-20221111-en
General
-
Target
686df0ad4cc11e15e7e37262f3ba55505a7ed244316ddb82c57d75f81f8e472e
-
Size
334KB
-
MD5
055d3032edb0b1e28a612e280b6edfe0
-
SHA1
ee5d4b36dc3ec93d4b61db64d08d56f635d9fad1
-
SHA256
686df0ad4cc11e15e7e37262f3ba55505a7ed244316ddb82c57d75f81f8e472e
-
SHA512
9ed7bf30b065b963af525b1d19c445c70873e1a8220ee2ae95798e079dadf1560233a209964aa8fd64ad1e7bfa132d51af14a9b6348df95984636ce800b5a252
-
SSDEEP
6144:hnTi9bzSYT2u0CRXVMTR3NsGH8Qm8FgxxYrKd:hTOrT50CFVMTXsGHRgkW
Malware Config
Signatures
Files
-
686df0ad4cc11e15e7e37262f3ba55505a7ed244316ddb82c57d75f81f8e472e.exe windows x86
275c2552dd4a77de98bbeabdef658f40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
CreateFileA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
GetPrivateProfileStringA
GetSystemDefaultUILanguage
ReleaseMutex
GetTempPathA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
SetThreadPriority
CreateThread
InterlockedExchange
GetCurrentProcessId
LocalAlloc
FreeLibrary
Sleep
CancelIo
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
LoadLibraryA
GetProcAddress
VirtualFree
DeleteCriticalSection
OpenEventA
InitializeCriticalSection
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
TlsAlloc
SetLastError
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
HeapSize
UnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
user32
MessageBoxA
ExitWindowsEx
wsprintfA
advapi32
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcrt
_strset
Sections
PAGE Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 125KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE