Static task
static1
Behavioral task
behavioral1
Sample
67527e9f75331a4e9fe01b38c5ee91b9c19df0a6dbe4098f58496744a0b55f71.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
67527e9f75331a4e9fe01b38c5ee91b9c19df0a6dbe4098f58496744a0b55f71.exe
Resource
win10v2004-20221111-en
General
-
Target
67527e9f75331a4e9fe01b38c5ee91b9c19df0a6dbe4098f58496744a0b55f71
-
Size
1.1MB
-
MD5
f65fac3abb55ab1face9519ba539e936
-
SHA1
40a89c58912a8b9b9b16a9167d63179f603eefd4
-
SHA256
67527e9f75331a4e9fe01b38c5ee91b9c19df0a6dbe4098f58496744a0b55f71
-
SHA512
b54022c35f1d642996a57b0fb0f775b2de36e7545d1d5ffcc0c08e3fd8b49f4c03a89360a71b509c434cf6929f9de3eba96b1bbb4157f42e1199ed9aab502a73
-
SSDEEP
12288:IafeuuU1Jj/F7g1zjA9zPyKwrIEaIL1UEThBXS2O13u0rl14OtlLCLCSG5:d24zFMV85Py6b663zv5tlmLlO
Malware Config
Signatures
Files
-
67527e9f75331a4e9fe01b38c5ee91b9c19df0a6dbe4098f58496744a0b55f71.exe windows x86
ba624edf4e08baae56ba90958a3ca541
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
EqualSid
FreeSid
GetTokenInformation
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
kernel32
CreateEventA
CreateFileA
CreateMutexA
CreateProcessA
CreateThread
DeleteFileA
DosDateTimeToFileTime
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FormatMessageA
FreeLibrary
FreeResource
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetExitCodeProcess
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
CreateDirectoryA
GetProcAddress
GetShortPathNameA
GetStartupInfoA
GetSystemDirectoryA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetVersionExA
GetVolumeInformationA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
IsDBCSLeadByte
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
ReadFile
RemoveDirectoryA
ResetEvent
SetCurrentDirectoryA
SetEvent
SetFileAttributesA
SetFilePointer
SetFileTime
SizeofResource
TerminateThread
WaitForSingleObject
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CloseHandle
GetPrivateProfileStringA
gdi32
GetDeviceCaps
user32
CallWindowProcA
CharNextA
CharPrevA
CharUpperA
DialogBoxIndirectParamA
DispatchMessageA
EnableWindow
EndDialog
ExitWindowsEx
GetDC
GetDesktopWindow
GetDlgItem
GetDlgItemTextA
GetWindowLongA
GetWindowRect
LoadStringA
MessageBeep
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
ReleaseDC
SendDlgItemMessageA
SendMessageA
SetDlgItemTextA
SetForegroundWindow
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
wsprintfA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ