Static task
static1
Behavioral task
behavioral1
Sample
f04b26766204d76e4747dc8b9b28480aebc6af3ced34924680a321dce249c8ce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f04b26766204d76e4747dc8b9b28480aebc6af3ced34924680a321dce249c8ce.exe
Resource
win10v2004-20221111-en
General
-
Target
f04b26766204d76e4747dc8b9b28480aebc6af3ced34924680a321dce249c8ce
-
Size
216KB
-
MD5
ecbea842e1cb083079a46b30175b7420
-
SHA1
e99d1e54854563c337fd4063177e056413ed732f
-
SHA256
f04b26766204d76e4747dc8b9b28480aebc6af3ced34924680a321dce249c8ce
-
SHA512
901a0048c736998b82a83973aeb2a7dafdaad52d87ff26bfe26fdbc9291ef9ea66c957263a4ec7243d116b60eda8c98f5f8cff39c6240283562a8137b3665316
-
SSDEEP
3072:2u75rJqqJJ6gg9kKxnSxN0tSYIHV/kJEUP9OwS212Zzr+MOdITpF+dHM6eMP5WD9:5ZUqr7zKxsHV/kJE8hS82Na5dIvZJ/
Malware Config
Signatures
Files
-
f04b26766204d76e4747dc8b9b28480aebc6af3ced34924680a321dce249c8ce.exe windows x86
8dc510f6e39116fa6af59aa831711661
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCurrentProcessId
IsDBCSLeadByte
GetLastError
GetSystemDefaultLangID
GetFileTime
FileTimeToDosDateTime
FileTimeToLocalFileTime
SetCurrentDirectoryA
GetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
FindFirstFileA
FindClose
FindNextFileA
DeleteFileA
MoveFileA
GetCurrentDirectoryA
CreateFileA
CloseHandle
ReadFile
WriteFile
SetFilePointer
LockFile
UnlockFile
GetLocalTime
_lread
_llseek
CompareStringA
_lwrite
_lclose
FreeLibrary
LoadLibraryA
GetFullPathNameA
HeapFree
lstrcmpiA
GetModuleHandleA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetDriveTypeA
HeapAlloc
HeapCreate
HeapDestroy
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
CompareStringW
SetEnvironmentVariableA
RaiseException
SetStdHandle
HeapReAlloc
GetProcAddress
DisableThreadLibraryCalls
GetModuleFileNameA
FlushFileBuffers
lstrcpyA
GetCommandLineA
VirtualAlloc
LoadLibraryExA
user32
CharUpperA
OemToCharA
CharToOemA
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegCreateKeyA
cmutil
CmConvertRelativePathW
ReleaseBold
CmStrCatAllocW
CmStripPathAndExtW
SzToWzWithAlloc
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 157KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 23KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ