Static task
static1
Behavioral task
behavioral1
Sample
742eaed6a2858dfd866273eb6638e445199cf04ff1c514b00b725b0cc367f675.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
742eaed6a2858dfd866273eb6638e445199cf04ff1c514b00b725b0cc367f675.exe
Resource
win10v2004-20220812-en
General
-
Target
742eaed6a2858dfd866273eb6638e445199cf04ff1c514b00b725b0cc367f675
-
Size
38KB
-
MD5
eb6b09ccbcca3ee6bb5ab1fbe983a0e1
-
SHA1
5570ba5164d18ff3321764266a2b7d0feb92e531
-
SHA256
742eaed6a2858dfd866273eb6638e445199cf04ff1c514b00b725b0cc367f675
-
SHA512
da1e51f360c7c86e52b2742449da3a638f730b020f2a4e63ceddea3264d171f9aa544ebfde0368c709cbe1ff720de1e9125a4232172d036af4e8f8a592e9d982
-
SSDEEP
384:RvJave9eB79yx0KtwJ11WsSq7hkDTZDb4v0Vw9oCW/rcIEPAEe/rY8e9JimZKHE0:ZJMe96C0esqYvfWA2EmLQJIaisKl4qR
Malware Config
Signatures
Files
-
742eaed6a2858dfd866273eb6638e445199cf04ff1c514b00b725b0cc367f675.exe windows x86
8f6be0945247b08830f284577a83f844
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateEventA
lstrcmpA
CreateFileA
lstrcpyA
CreateDirectoryA
lstrcatA
WaitForMultipleObjects
GetTickCount
GetSystemTimeAsFileTime
FlushFileBuffers
WriteFile
GetStartupInfoA
ExitProcess
GetCommandLineA
GetModuleHandleA
DebugBreak
HeapAlloc
GetProcessHeap
HeapReAlloc
CreateMutexA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
CreateThread
Sleep
FreeLibrary
GetProcAddress
LoadLibraryA
SetThreadPriority
GetCurrentThread
GetFileAttributesA
GetCurrentProcessId
OpenProcess
LocalFree
GetVersionExA
GetDriveTypeA
lstrcpynA
CreateFileMappingA
SetLastError
DuplicateHandle
GetCurrentProcess
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEvent
WaitForSingleObject
ResetEvent
GetModuleFileNameA
lstrlenA
GetLastError
HeapFree
CloseHandle
user32
MsgWaitForMultipleObjects
GetMessageA
TranslateMessage
GetKeyboardType
IsWindow
DestroyWindow
UnhookWindowsHookEx
CharNextA
wsprintfA
SetWindowsHookExA
DispatchMessageA
CreateDialogIndirectParamA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
ole32
StringFromGUID2
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE