Static task
static1
Behavioral task
behavioral1
Sample
68575ab6048a648b7d94141254a80397b03a5647a36b11e47e950920951da187.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68575ab6048a648b7d94141254a80397b03a5647a36b11e47e950920951da187.exe
Resource
win10v2004-20220812-en
General
-
Target
68575ab6048a648b7d94141254a80397b03a5647a36b11e47e950920951da187
-
Size
83KB
-
MD5
13ad2fd3846314c3b80f13b8a57b6d42
-
SHA1
e663671e832b6a24453b108dbcdd95405989d7ac
-
SHA256
68575ab6048a648b7d94141254a80397b03a5647a36b11e47e950920951da187
-
SHA512
c56b48ee49f45d294a11fe26776319fbf2b596884f616b8c79af6dd6cb5d4bf40fb8094c769365271a6b499cdffce25a4f6902309a9bfc1d6608603b50bb20cd
-
SSDEEP
1536:UT7/DQEmZFD+pgJcan0DY8EkN7mzUwz0b4SHW3clONXtRDBZK+2T:UT7/DjmbULUo3Wsl2RVZQT
Malware Config
Signatures
Files
-
68575ab6048a648b7d94141254a80397b03a5647a36b11e47e950920951da187.exe windows x86
4f336cda9318c8acba551e5f458f2b02
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
lz32
LZClose
advapi32
DeregisterEventSource
ReportEventA
RegDeleteKeyA
InitializeSecurityDescriptor
RegisterEventSourceA
RegOpenKeyExA
RegSetValueExA
SetSecurityDescriptorDacl
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
msvcrt
free
_ultoa
_iob
rand
_makepath
vprintf
strtoul
memmove
wcslen
printf
_strupr
isprint
_stricmp
_onexit
_initterm
fprintf
_vsnprintf
atol
strchr
_except_handler3
sprintf
malloc
toupper
strpbrk
_purecall
fopen
strtok
_fullpath
_splitpath
swprintf
_ltoa
_adjust_fdiv
_itoa
vsprintf
time
_strnicmp
fclose
_snprintf
fflush
_ftol
__dllonexit
strncpy
winmm
auxSetVolume
kernel32
GlobalAlloc
ResetEvent
GetExitCodeThread
MoveFileA
GetCurrentProcessId
FindNextFileA
GetLocalTime
CreateThread
QueryPerformanceFrequency
WaitForSingleObjectEx
HeapFree
LCMapStringW
lstrcmpA
Sleep
SetThreadPriority
CopyFileA
GlobalMemoryStatus
lstrcpyA
GetDiskFreeSpaceA
UnmapViewOfFile
CreateEventA
LoadLibraryA
QueryPerformanceCounter
GetSystemInfo
WriteFileEx
GetModuleHandleA
GetFileAttributesA
WaitForMultipleObjectsEx
CreateDirectoryA
LeaveCriticalSection
FindFirstFileA
ReadFile
SleepEx
GetCurrentThreadId
SetEvent
GlobalFree
CreateMutexA
TerminateProcess
WaitForSingleObject
DeleteFileA
ReadProcessMemory
HeapDestroy
OutputDebugStringA
HeapCreate
VirtualQuery
RemoveDirectoryA
InterlockedIncrement
HeapAlloc
TlsSetValue
GetProcAddress
ExpandEnvironmentStringsA
DeleteCriticalSection
GetVersionExA
GetUserDefaultLangID
TlsGetValue
IsProcessorFeaturePresent
TlsAlloc
UnhandledExceptionFilter
CreateFileMappingA
GetLastError
GetProcessHeap
DebugBreak
EnterCriticalSection
WriteFile
ReadFileEx
CreateFileA
GetFileSize
SetFilePointer
MapViewOfFile
CloseHandle
TlsFree
IsValidLocale
GetModuleFileNameA
ReleaseMutex
GetDriveTypeA
VirtualAlloc
FreeLibrary
SetEndOfFile
ReleaseSemaphore
InitializeCriticalSection
GetCurrentThread
GetSystemDefaultLangID
FindClose
VirtualFree
FlushFileBuffers
GetOverlappedResult
GetTickCount
lstrlenA
GetCurrentProcess
CreateSemaphoreA
Sections
.textbss Size: 77KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ