Static task
static1
Behavioral task
behavioral1
Sample
80636b4aa3df917bf824500150a6232bb3bcffba075a728ddaaf3757eb3a9894.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
80636b4aa3df917bf824500150a6232bb3bcffba075a728ddaaf3757eb3a9894.exe
Resource
win10v2004-20221111-en
General
-
Target
80636b4aa3df917bf824500150a6232bb3bcffba075a728ddaaf3757eb3a9894
-
Size
28KB
-
MD5
60b2d3dd097aad4af61b7e94726f08dd
-
SHA1
01fa5acd7cfe35bfaf666c1212b31634801675ce
-
SHA256
80636b4aa3df917bf824500150a6232bb3bcffba075a728ddaaf3757eb3a9894
-
SHA512
ef4567fb0e91df1a75b45d8c7e2f868b9337c6cfeceecfa5f588fb648d6913239a7f3e7962cedf92a8963d7a4e40910e1136b8dab8f67efcf7bddbc3a3d6c0cf
-
SSDEEP
768:KZIrlyz1/J/KGmOFiFa8yTmuxP2sXxy4vso0euvIsT7ksHdASRVY:KyAp9EWqa8SzesXxvUo0PIs79ASRVY
Malware Config
Signatures
Files
-
80636b4aa3df917bf824500150a6232bb3bcffba075a728ddaaf3757eb3a9894.exe windows x86
f4896ce830a2c027bfd808984a052111
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
ReadFileEx
GetCurrentProcess
GetDiskFreeSpaceA
IsProcessorFeaturePresent
FindFirstFileA
CreateFileA
GetTickCount
GlobalFree
GetUserDefaultLangID
GetCurrentProcessId
GetModuleFileNameA
GetLastError
CreateEventA
Sleep
SetEvent
QueryPerformanceFrequency
GetCurrentThread
UnhandledExceptionFilter
RemoveDirectoryA
FindClose
lstrcmpA
LCMapStringW
CreateMutexA
GetSystemInfo
CreateFileMappingA
HeapCreate
VirtualAlloc
DeleteCriticalSection
ResetEvent
ExpandEnvironmentStringsA
FindNextFileA
GetLocalTime
CloseHandle
GetCurrentThreadId
DeleteFileA
LoadLibraryA
GetFileAttributesA
TlsAlloc
GetOverlappedResult
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
SetThreadPriority
CreateThread
TlsSetValue
ReadProcessMemory
GetSystemDefaultLangID
HeapFree
GetDriveTypeA
WaitForSingleObjectEx
WriteFileEx
ReleaseMutex
TlsGetValue
GetExitCodeThread
GetProcessHeap
lstrcpyA
InitializeCriticalSection
SleepEx
WaitForMultipleObjectsEx
MapViewOfFile
WriteFile
CreateSemaphoreA
HeapDestroy
MoveFileA
FreeLibrary
HeapAlloc
WaitForSingleObject
GlobalAlloc
InterlockedIncrement
VirtualQuery
DebugBreak
ReleaseSemaphore
SetEndOfFile
OutputDebugStringA
QueryPerformanceCounter
ReadFile
GetVersionExA
GetModuleHandleA
UnmapViewOfFile
GetFileSize
lstrlenA
TlsFree
IsValidLocale
GlobalMemoryStatus
TerminateProcess
FlushFileBuffers
CopyFileA
CreateDirectoryA
msvcrt
strchr
exit
fopen
isprint
wcslen
_purecall
atol
_except_handler3
strtoul
_stricmp
strpbrk
_beep
vsprintf
printf
_chdir
time
_ftol
__dllonexit
_strnicmp
strtok
fclose
toupper
_iob
free
strncpy
malloc
_fullpath
fprintf
_onexit
_vsnprintf
_adjust_fdiv
_beginthread
rand
memmove
_ultoa
fflush
_itoa
vprintf
_snprintf
_splitpath
sprintf
_makepath
advapi32
RegCloseKey
RegisterEventSourceA
RegQueryValueExA
RegDeleteValueA
InitializeSecurityDescriptor
RegDeleteKeyA
DeregisterEventSource
ReportEventA
SetSecurityDescriptorDacl
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
winmm
auxSetVolume
Sections
.textbss Size: 21KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mgtghor Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE