Static task
static1
Behavioral task
behavioral1
Sample
769c7686f0a5fa7759df8eeffb693adf89574eb2b924e41e0dc9e24b95df9775.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
769c7686f0a5fa7759df8eeffb693adf89574eb2b924e41e0dc9e24b95df9775.exe
Resource
win10v2004-20220901-en
General
-
Target
769c7686f0a5fa7759df8eeffb693adf89574eb2b924e41e0dc9e24b95df9775
-
Size
176KB
-
MD5
94b658f8015adbec80f8101411e2fd97
-
SHA1
e487aab9c53df99885de204e3b0ed0a0a60f2890
-
SHA256
769c7686f0a5fa7759df8eeffb693adf89574eb2b924e41e0dc9e24b95df9775
-
SHA512
fe8d176f3b9a2242141eb63714eedd12ce0c534c5daf6de0ace0829eec50bd32801d5827b5a7c685c6fd315990c6e4eb3bc0401f6c15b856b6a27ddef05bd547
-
SSDEEP
3072:UuhC1Jel+nGOTslNk5IuimpdVRA59aO1uwCg10ZCVcmqzls5s8KhtMxMm:UugJe0Ile745DUwCgWZCVrqps9j
Malware Config
Signatures
Files
-
769c7686f0a5fa7759df8eeffb693adf89574eb2b924e41e0dc9e24b95df9775.exe windows x86
b787f8c89d0c4ecc30f5f2b5c38740cb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAdjustment
GetLastError
GetLocaleInfoA
CreateNamedPipeA
DeleteFileA
AreFileApisANSI
DeleteFileW
MoveFileA
MoveFileW
GetTempFileNameA
GetTempPathA
GetTempFileNameW
GetTempPathW
CreateFileA
CreateFileW
CloseHandle
SetFilePointer
ReadFile
WriteFile
GetStringTypeW
LoadLibraryA
FreeLibrary
GetProcAddress
GlobalFree
GetVersion
GlobalAlloc
ExitProcess
RtlUnwind
RaiseException
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetDriveTypeW
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
InterlockedExchange
VirtualQuery
HeapFree
SetUnhandledExceptionFilter
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
MultiByteToWideChar
FatalAppExitA
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
GetTimeZoneInformation
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameW
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
GetCurrentDirectoryW
SetStdHandle
FlushFileBuffers
SetConsoleCtrlHandler
SetEndOfFile
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
WideCharToMultiByte
FindFirstFileA
FindFirstFileW
FindClose
GetModuleHandleA
GetFileAttributesW
user32
CharToOemA
OemToCharBuffA
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetAce
InitializeAcl
GetSecurityInfo
AddAce
oleaut32
SysReAllocStringLen
SafeArraySetRecordInfo
VarTokenizeFormatString
GetErrorInfo
Sections
.text Size: 97KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 306B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ