Static task
static1
Behavioral task
behavioral1
Sample
f5b90b2ff87605d99e50c49a5fc65e655793f3c67465aa08f1d837e1a8def1e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5b90b2ff87605d99e50c49a5fc65e655793f3c67465aa08f1d837e1a8def1e2.exe
Resource
win10v2004-20220812-en
General
-
Target
f5b90b2ff87605d99e50c49a5fc65e655793f3c67465aa08f1d837e1a8def1e2
-
Size
192KB
-
MD5
f33c7972f333e351e334cfb325827818
-
SHA1
44eec8126e4c459c5165f7186679e44f6d268497
-
SHA256
f5b90b2ff87605d99e50c49a5fc65e655793f3c67465aa08f1d837e1a8def1e2
-
SHA512
72e78086f01744784151a2589ee640b0fdc526adb804f4b92c9f66275f1a25cad18af3f5549b1f0c9258ef0492cd36738005c5e9fa9f54e36868251b945a4c28
-
SSDEEP
3072:w2HMnw9YD/z2FO6Miv3ZfkgXme1RcMdZg21OWRTJ6tjhtHi:Enw9w6FOCv3ZMgXme7TggOMF6/i
Malware Config
Signatures
Files
-
f5b90b2ff87605d99e50c49a5fc65e655793f3c67465aa08f1d837e1a8def1e2.exe windows x86
27000733c2f6a59012b970be632f4bc0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
InterlockedDecrement
GetDriveTypeA
GetVolumeInformationA
GetFileAttributesA
GetEnvironmentVariableA
SetFileAttributesA
GetModuleFileNameA
WinExec
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
CreateFileW
CreateFileA
GetLocaleInfoW
GetTimeZoneInformation
ReadFile
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
lstrlenA
LocalFree
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
CreateDirectoryA
GetLocalTime
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
GetCommandLineA
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
GetProcAddress
GetModuleHandleA
ExitProcess
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
SetFilePointer
CloseHandle
GetFullPathNameA
GetCurrentDirectoryA
user32
DispatchMessageA
LoadCursorA
ShowWindow
GetMessageA
SetTimer
RegisterClassExA
PostQuitMessage
FindWindowExA
SendMessageA
TranslateMessage
GetForegroundWindow
CreateWindowExA
DefWindowProcA
FindWindowA
ole32
OleUninitialize
OleRun
CoCreateInstance
OleInitialize
oleaut32
GetErrorInfo
SafeArrayGetUBound
SysFreeString
SysStringByteLen
SafeArrayUnaccessData
SysAllocStringByteLen
SafeArrayAccessData
VariantClear
SafeArrayGetLBound
SysStringLen
SysAllocString
shlwapi
StrToIntA
Sections
.text Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jpssiwk Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
akhlsca Size: - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE