Static task
static1
Behavioral task
behavioral1
Sample
76f3a440c2f509a4909d10c0047ccb9bb98bab74430d859c9b2ccc640616945f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76f3a440c2f509a4909d10c0047ccb9bb98bab74430d859c9b2ccc640616945f.exe
Resource
win10v2004-20221111-en
General
-
Target
76f3a440c2f509a4909d10c0047ccb9bb98bab74430d859c9b2ccc640616945f
-
Size
174KB
-
MD5
db28f9a9b555dc6292f3ca4036950f4a
-
SHA1
1657848c5eaa75625db5b3ad84f5e494925b6eda
-
SHA256
76f3a440c2f509a4909d10c0047ccb9bb98bab74430d859c9b2ccc640616945f
-
SHA512
25c42f209684113432c7b25e7c8d5e6548549a33936481d3bb52293db484b977c745018bd2aaf38e9042a108a2f8325346deae3d4ba1f60696cda75ff2cabef7
-
SSDEEP
3072:4EQdpBKGalqNVq5L7xJybL95BfCkHJp81dazQFBm94RYP+JQ0DA:od2Gal+VCdJkLBakpp81U4RYPj
Malware Config
Signatures
Files
-
76f3a440c2f509a4909d10c0047ccb9bb98bab74430d859c9b2ccc640616945f.exe windows x86
80d6597cb462c3d52c6f607ef74578c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetVersionExW
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
ResumeThread
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
SetThreadPriority
CreateFileW
GetPrivateProfileStringW
GetFileAttributesW
GetModuleFileNameW
SuspendThread
WaitForMultipleObjects
CreateEventW
FindNextFileW
OutputDebugStringW
DeleteFileW
CreateDirectoryW
TerminateProcess
MultiByteToWideChar
ole32
CoDeactivateObject
CoUninitialize
advapi32
RegQueryValueExA
RegOpenKeyExA
LsaGetSystemAccessAccount
RegSetValueExA
RegCreateKeyExA
RegCloseKey
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ