Static task
static1
Behavioral task
behavioral1
Sample
05256d4f8d7ceefe56ea9649baa6424266c6e90ada173d105db1d7e24cacd062.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
05256d4f8d7ceefe56ea9649baa6424266c6e90ada173d105db1d7e24cacd062.exe
Resource
win10v2004-20220901-en
General
-
Target
05256d4f8d7ceefe56ea9649baa6424266c6e90ada173d105db1d7e24cacd062
-
Size
147KB
-
MD5
876f9b3fb2b89ade2db52cbd6d6d2e28
-
SHA1
ab10aa5e67cd33a077a63ad35c96b11919c7bd4f
-
SHA256
05256d4f8d7ceefe56ea9649baa6424266c6e90ada173d105db1d7e24cacd062
-
SHA512
13931f1c919e9fd6842f0d77d021fce18102e409c0e842212aeae5221e603f394d27378d38bbc3032957449db9313c0474b4cef68a48e2de5c240c2501ce3c3b
-
SSDEEP
3072:OqR1F6AJqttYXKYYg1+MR0B4lQja9BmrUpUWz7uk:Oaf6ICiXKYYgkTK/QrU6Wz7
Malware Config
Signatures
Files
-
05256d4f8d7ceefe56ea9649baa6424266c6e90ada173d105db1d7e24cacd062.exe windows x86
0873fa343a9e6b4a03dcfe5eba42f09e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
GetCurrentThread
GetVersion
RemoveDirectoryW
ReadFile
EnterCriticalSection
DeleteFileA
ReadConsoleA
PeekConsoleInputA
GetUserDefaultLCID
SetEndOfFile
TlsAlloc
ReadConsoleInputA
DuplicateHandle
GetDriveTypeA
GetFileType
SetConsoleCtrlHandler
FindNextFileA
CreateThread
FreeLibrary
GetCurrentProcess
GetSystemDefaultLangID
GetStdHandle
GetFileAttributesW
IsBadWritePtr
FindNextFileW
SetFilePointer
TlsGetValue
SetEnvironmentVariableW
SetFileTime
SetUnhandledExceptionFilter
GetCurrentDirectoryA
GetSystemDefaultLCID
SetConsoleMode
CreateFileA
CloseHandle
GetLastError
TlsSetValue
GetStartupInfoA
GetProcAddress
GetDriveTypeW
FindFirstFileA
IsValidCodePage
GetLocalTime
UnlockFile
FindClose
GetConsoleMode
GetLogicalDrives
ResumeThread
FindFirstFileW
CreateFileW
FileTimeToSystemTime
GetDiskFreeSpaceA
GetModuleHandleA
GetModuleFileNameW
SetCurrentDirectoryW
SetFileAttributesA
GetEnvironmentStrings
MultiByteToWideChar
GetCommandLineA
GetModuleFileNameA
SetCurrentDirectoryA
WaitForSingleObject
GetFullPathNameW
SetEnvironmentVariableA
LeaveCriticalSection
IsBadCodePtr
SystemTimeToFileTime
QueryPerformanceCounter
RtlUnwind
CreateDirectoryA
RemoveDirectoryA
LockFile
InitializeCriticalSection
GetCPInfo
FlushFileBuffers
GetACP
FileTimeToLocalFileTime
WriteFile
LocalFileTimeToFileTime
LoadLibraryW
CreatePipe
GetTimeZoneInformation
GetNumberOfConsoleInputEvents
VirtualFree
GetFileAttributesA
GetCurrentDirectoryW
Beep
DeleteCriticalSection
SetLocalTime
CreateDirectoryW
WriteConsoleA
RaiseException
GetFileInformationByHandle
SetStdHandle
SetFileAttributesW
GetExitCodeProcess
user32
MessageBoxA
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 14KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ