Static task
static1
Behavioral task
behavioral1
Sample
f04ef6ec49cc5267ed6e3f0e213582af65a0010105db403dbadc3f4b0197552a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f04ef6ec49cc5267ed6e3f0e213582af65a0010105db403dbadc3f4b0197552a.exe
Resource
win10v2004-20220812-en
General
-
Target
f04ef6ec49cc5267ed6e3f0e213582af65a0010105db403dbadc3f4b0197552a
-
Size
272KB
-
MD5
7703b9329e96382e115cb9e19e54024e
-
SHA1
52b5cbed8809d72d16a3eda87cec66975e3d7575
-
SHA256
f04ef6ec49cc5267ed6e3f0e213582af65a0010105db403dbadc3f4b0197552a
-
SHA512
5ee714e0c2cc5c4a147b8a43b95673eafd8a2de979d428f9d4ef7bd31f6b4d2b77ca8313971195351c243061578c6471a29a088a28c3a5cca5dd4e9492421324
-
SSDEEP
6144:PUOihsCVrp+oXLxx50lBy+kuO91Yk+G0n90dnA:2hsCVpjXLxxS/hyoGo0K
Malware Config
Signatures
Files
-
f04ef6ec49cc5267ed6e3f0e213582af65a0010105db403dbadc3f4b0197552a.exe windows x86
b96e2d3056841d280dbe1bcbd49aa9c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
VirtualAlloc
SetErrorMode
CreateThread
SetFilePointer
LockResource
ReadFile
FlushFileBuffers
LocalFree
FindCloseChangeNotification
LoadResource
RaiseException
GetSystemInfo
InitializeCriticalSection
GetFileAttributesW
WaitForSingleObject
SetStdHandle
FreeEnvironmentStringsA
CompareStringW
ReleaseMutex
WaitForSingleObjectEx
lstrlenA
GlobalAlloc
TryEnterCriticalSection
InterlockedCompareExchange
ReadFileEx
CreateFileW
SetEndOfFile
GetFileSize
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
IsBadWritePtr
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
Sleep
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
SetEnvironmentVariableA
shlwapi
StrRStrIW
shell32
SHFileOperationW
Sections
.ptext Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 218KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ