Static task
static1
Behavioral task
behavioral1
Sample
a226ae855b8ec0bb74bcb75833495311896115b752bcf74aaa600a0e1894ef25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a226ae855b8ec0bb74bcb75833495311896115b752bcf74aaa600a0e1894ef25.exe
Resource
win10v2004-20221111-en
General
-
Target
a226ae855b8ec0bb74bcb75833495311896115b752bcf74aaa600a0e1894ef25
-
Size
228KB
-
MD5
57729ed44599d43412e85a22af5992b7
-
SHA1
78e85d51557e23a02c1930bf4e3de7373e469aad
-
SHA256
a226ae855b8ec0bb74bcb75833495311896115b752bcf74aaa600a0e1894ef25
-
SHA512
591679db403644ff11f8e19e9bee6784935a6055c80264304c851305b30de6a50eed1401358abb448bd490f74fc67732142f66dcd9255a55f4775b67921d9990
-
SSDEEP
6144:fnGi97zSY02u0CRXVMTR3NfGH8Qm8Fg78TA8Tq:fGOL050CFVMTXfGHRg
Malware Config
Signatures
Files
-
a226ae855b8ec0bb74bcb75833495311896115b752bcf74aaa600a0e1894ef25.exe windows x86
275c2552dd4a77de98bbeabdef658f40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
CreateFileA
TerminateThread
OutputDebugStringA
GetCurrentProcess
SetFileAttributesA
GetModuleFileNameA
DeleteFileA
CreateProcessA
GetPrivateProfileStringA
GetSystemDefaultUILanguage
ReleaseMutex
GetTempPathA
SetErrorMode
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
SetThreadPriority
CreateThread
InterlockedExchange
GetCurrentProcessId
LocalAlloc
FreeLibrary
Sleep
CancelIo
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
CreateEventA
LoadLibraryA
GetProcAddress
VirtualFree
DeleteCriticalSection
OpenEventA
InitializeCriticalSection
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
HeapFree
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
TlsAlloc
SetLastError
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
HeapSize
UnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
SetStdHandle
FlushFileBuffers
user32
MessageBoxA
ExitWindowsEx
wsprintfA
advapi32
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeleteService
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
msvcrt
_strset
Sections
PAGE Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 125KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ