Static task
static1
Behavioral task
behavioral1
Sample
666a876dc8ea16dc58959540a3d72b2bfc40de1eebaca09f56a085879b93e4c1.exe
Resource
win7-20220812-en
General
-
Target
666a876dc8ea16dc58959540a3d72b2bfc40de1eebaca09f56a085879b93e4c1
-
Size
160KB
-
MD5
14712c59f9907e2829c686dfce853a80
-
SHA1
d6ce65f828b5c99843b43352e02a946d33c2d88e
-
SHA256
666a876dc8ea16dc58959540a3d72b2bfc40de1eebaca09f56a085879b93e4c1
-
SHA512
59a9f7b4b07b7d873242775d82b949f4dfead451760188d85562f719d67f7c094efbd3f9c51c6af527fd495d0eba5ef70baa4b9c3a8f717c4206cdf0697dca06
-
SSDEEP
3072:zVouj2qgu7klbJBJ5ByuC/xUBf1OXZa6rOX5kMPOxylt:zVRj2hLlTJDr6pTr
Malware Config
Signatures
Files
-
666a876dc8ea16dc58959540a3d72b2bfc40de1eebaca09f56a085879b93e4c1.exe windows x86
cb2f54bd6f3c4b2e1669e2bd24537e1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetCommandLineW
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersion
HeapAlloc
HeapFree
InterlockedExchange
FreeLibrary
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
SetCurrentDirectoryA
SetErrorMode
SetThreadPriority
lstrcatA
lstrcpyA
lstrlenA
lstrlenW
VirtualAlloc
FormatMessageA
ExitProcess
CreateMutexA
CompareStringA
LoadLibraryA
CloseHandle
user32
IsIconic
IsWindowVisible
MessageBoxA
SendMessageTimeoutA
SetForegroundWindow
ShowWindow
LoadIconA
LoadCursorA
LoadCursorW
LoadIconW
GetWindow
GetParent
GetDesktopWindow
GetClassNameA
FindWindowA
GetWindowThreadProcessId
gdi32
GetStockObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ