Static task
static1
Behavioral task
behavioral1
Sample
815c58ed8f83d81f25be16abda1b6e292c34efac8effc8487f4072fcbaf647c8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
815c58ed8f83d81f25be16abda1b6e292c34efac8effc8487f4072fcbaf647c8.exe
Resource
win10v2004-20220812-en
General
-
Target
815c58ed8f83d81f25be16abda1b6e292c34efac8effc8487f4072fcbaf647c8
-
Size
100KB
-
MD5
3dc5f61fcdcc14dc79f31228a892d8d4
-
SHA1
2c8a110ac3825ba6e0507907170a81830b66ef88
-
SHA256
815c58ed8f83d81f25be16abda1b6e292c34efac8effc8487f4072fcbaf647c8
-
SHA512
ff00dc2dbf6a37dff2eb074b936a3750c3b830a3f4eef4c8851c57b12490f472ce53622ff5d9f4c8c295bf580b64548cc7a38c512dbf17b09d1ecea82b0e6d5f
-
SSDEEP
768:Cg9CL090jhOY/qIzGkhttwEc5QNif6BFlhaGedyEu+7pk5E0lS0H+AMeXVxrUOkU:CC9ujj/trjtk5xSqdkK0liAMSFpo6t
Malware Config
Signatures
Files
-
815c58ed8f83d81f25be16abda1b6e292c34efac8effc8487f4072fcbaf647c8.exe windows x86
f2ac2bceffa6cc965d65412a26bf2615
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
CreateThread
HeapAlloc
GetProcessHeap
HeapFree
SetLastError
OpenProcess
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetModuleHandleA
CloseHandle
GetThreadPriority
Process32First
CreateToolhelp32Snapshot
GetComputerNameA
GetSystemDefaultLCID
GetOEMCP
GetACP
GetCPInfo
CreateFileA
SetStdHandle
IsBadCodePtr
GetCurrentProcessId
MultiByteToWideChar
GetModuleFileNameA
GetTempPathA
FindFirstFileA
GetLastError
FindClose
GetCurrentThread
GetCurrentProcess
Process32Next
SetErrorMode
IsBadReadPtr
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
Sleep
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
user32
GetWindowRect
GetForegroundWindow
GetWindow
GetMessageA
GetParent
GetWindowLongA
gdi32
GetCurrentObject
advapi32
SetServiceStatus
StartServiceA
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
OpenSCManagerA
OpenProcessToken
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
SysFreeString
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ