Static task
static1
Behavioral task
behavioral1
Sample
179f498c299a8fe27120a47fa1d55c56670f0ebdcda67ca1e0a8d9cfd274e41f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
179f498c299a8fe27120a47fa1d55c56670f0ebdcda67ca1e0a8d9cfd274e41f.exe
Resource
win10v2004-20220901-en
General
-
Target
179f498c299a8fe27120a47fa1d55c56670f0ebdcda67ca1e0a8d9cfd274e41f
-
Size
192KB
-
MD5
85cf4645f548ed0da5a12cc79a410f4c
-
SHA1
ab75e25c444c5cd01970c9ac2da006f6c3167545
-
SHA256
179f498c299a8fe27120a47fa1d55c56670f0ebdcda67ca1e0a8d9cfd274e41f
-
SHA512
f606a13f0b147756785bab94668425be3028e9beb4e595291aebe98c1d16fa13f50863c95e8c6e3caaa893c1507117a52be48d206d9852e6d34b7d2f13c73ccb
-
SSDEEP
3072:w0n3OcEtB3edPTJ6F7LXxTfrW33aGDKmUu8pXqndUKiXNb:3n3ktIFTJ6F7RmUu8pXqndhy
Malware Config
Signatures
Files
-
179f498c299a8fe27120a47fa1d55c56670f0ebdcda67ca1e0a8d9cfd274e41f.exe windows x86
5bbc6b7183fe30cabe21c4408cb0c8d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32NextW
lstrcmpiW
CloseHandle
GetCurrentProcess
OpenProcess
GetSystemDirectoryW
lstrcpyW
FreeLibrary
LoadLibraryW
GetProcAddress
CopyFileW
Sleep
DeleteFileW
RemoveDirectoryW
lstrcpyA
lstrcatW
GetWindowsDirectoryW
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
WaitForSingleObject
GetExitCodeThread
Process32FirstW
HeapAlloc
CreateFileA
WriteFile
lstrlenA
lstrcmpiA
GetModuleFileNameW
GetModuleHandleW
lstrlenW
SetUnhandledExceptionFilter
GetCommandLineA
GetVersionExW
GetNativeSystemInfo
lstrcatA
CreateDirectoryA
LoadLibraryA
CreateDirectoryW
GetSystemDirectoryA
MultiByteToWideChar
CreateFileW
CreateToolhelp32Snapshot
ExitProcess
GetTickCount
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
RemoveDirectoryA
GetProcessHeap
LCMapStringW
IsProcessorFeaturePresent
HeapReAlloc
HeapSize
WideCharToMultiByte
RtlUnwind
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
shell32
SHGetFolderPathA
ShellExecuteExA
SHGetFolderPathW
SHGetSpecialFolderPathA
shlwapi
StrStrA
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ