Static task
static1
Behavioral task
behavioral1
Sample
790c8f6e95e568bc9f3aaba5831c7c2d8c4251af4b3ea61dfaf52127b19a526b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
790c8f6e95e568bc9f3aaba5831c7c2d8c4251af4b3ea61dfaf52127b19a526b.exe
Resource
win10v2004-20220812-en
General
-
Target
790c8f6e95e568bc9f3aaba5831c7c2d8c4251af4b3ea61dfaf52127b19a526b
-
Size
324KB
-
MD5
da0725b491e99a367f8b78d469332d59
-
SHA1
565fe225d444ddb7fb0ea3b6a996b4c43bc09d02
-
SHA256
790c8f6e95e568bc9f3aaba5831c7c2d8c4251af4b3ea61dfaf52127b19a526b
-
SHA512
9cfe70c440f3bf4a2c76142e031a8eb3a968a9430927ce2f27341069500d05036622fc05c693631dd168e27d396edf213b97b09b8b17f037f44a77695ceeb046
-
SSDEEP
3072:9BakEJanAzv4imzMJA4yGRgbMfDaXGs2NuMHxNIHCiYF5mW:DrAzv4iWMJA4yGYMzzOW
Malware Config
Signatures
Files
-
790c8f6e95e568bc9f3aaba5831c7c2d8c4251af4b3ea61dfaf52127b19a526b.exe windows x86
7b5540186d2c728743135566c3114ca8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetACP
GetVersionExA
DeviceIoControl
GetComputerNameA
RemoveDirectoryA
GetTickCount
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCurrentProcess
GetComputerNameW
GetLocaleInfoA
GetProcessHeap
SetFileAttributesA
FindNextFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
QueryPerformanceCounter
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
RaiseException
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetDriveTypeA
FindFirstFileA
FlushFileBuffers
SetEndOfFile
Sleep
CreateFileA
TerminateProcess
GetVersion
ReadFile
GetFileSize
GetLastError
WriteFile
SetFilePointer
GetCurrentProcessId
DeleteFileA
SetFileTime
GetFileTime
GetSystemDirectoryA
CloseHandle
WaitForSingleObject
CreateSemaphoreA
FreeLibrary
GetProcAddress
LeaveCriticalSection
LoadLibraryA
EnterCriticalSection
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
HeapCreate
HeapFree
HeapAlloc
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringA
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
user32
LoadStringA
wsprintfA
TranslateMessage
GetMessageA
GetKeyboardLayout
MapVirtualKeyExA
MapVirtualKeyA
EnumDisplaySettingsA
wsprintfW
GetKeyNameTextA
GetForegroundWindow
DispatchMessageA
advapi32
GetUserNameA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocStringLen
SysAllocString
VariantInit
VariantClear
SysFreeString
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ