Static task
static1
Behavioral task
behavioral1
Sample
19b56faa41f10a45c006d98094edab3fefa45df9f46ceef7a4fb400909700cf8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
19b56faa41f10a45c006d98094edab3fefa45df9f46ceef7a4fb400909700cf8.exe
Resource
win10v2004-20220812-en
General
-
Target
19b56faa41f10a45c006d98094edab3fefa45df9f46ceef7a4fb400909700cf8
-
Size
169KB
-
MD5
f871183417416c5ed01e6ed8471a7e75
-
SHA1
8106774889f6f23dbf51a4e294a42341338a7703
-
SHA256
19b56faa41f10a45c006d98094edab3fefa45df9f46ceef7a4fb400909700cf8
-
SHA512
2006a15f96eaa96d81213d4b1f89ef4cd88a99f82a4b078efcbaba2125cc43c128ff6ae26d9aaccbae994139baed972ff4406742ff036b8b59e6249250fa8929
-
SSDEEP
3072:zKabybw76W8mxNtd/0Wz9IPRA5HBRGgnzZ6GDz2c1TernfXYkGO8RDXo:zKJwGW8mxNLl/5hkgnrf2c16EkGRE
Malware Config
Signatures
Files
-
19b56faa41f10a45c006d98094edab3fefa45df9f46ceef7a4fb400909700cf8.exe windows x86
b787f8c89d0c4ecc30f5f2b5c38740cb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAdjustment
GetLastError
GetLocaleInfoA
CreateNamedPipeA
DeleteFileA
AreFileApisANSI
DeleteFileW
MoveFileA
MoveFileW
GetTempFileNameA
GetTempPathA
GetTempFileNameW
GetTempPathW
CreateFileA
CreateFileW
CloseHandle
SetFilePointer
ReadFile
WriteFile
GetStringTypeW
LoadLibraryA
FreeLibrary
GetProcAddress
GlobalFree
GetVersion
GlobalAlloc
ExitProcess
RtlUnwind
RaiseException
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetDriveTypeW
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
InterlockedExchange
VirtualQuery
HeapFree
SetUnhandledExceptionFilter
TlsAlloc
SetLastError
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
MultiByteToWideChar
FatalAppExitA
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
GetTimeZoneInformation
GetFullPathNameA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameW
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
GetCurrentDirectoryW
SetStdHandle
FlushFileBuffers
SetConsoleCtrlHandler
SetEndOfFile
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersionExA
WideCharToMultiByte
FindFirstFileA
FindFirstFileW
FindClose
GetModuleHandleA
GetFileAttributesW
user32
CharToOemA
OemToCharBuffA
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetAce
InitializeAcl
GetSecurityInfo
AddAce
oleaut32
SysReAllocStringLen
SafeArraySetRecordInfo
VarTokenizeFormatString
GetErrorInfo
Sections
.text Size: 60KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 282B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ