Static task
static1
Behavioral task
behavioral1
Sample
da8dc1a9a38d34ac7cb095476298a55202b6f815f98c003b03069ccb5a81bb15.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da8dc1a9a38d34ac7cb095476298a55202b6f815f98c003b03069ccb5a81bb15.exe
Resource
win10v2004-20220901-en
General
-
Target
da8dc1a9a38d34ac7cb095476298a55202b6f815f98c003b03069ccb5a81bb15
-
Size
324KB
-
MD5
a19d858d54c3a52840b968e7d7d94e27
-
SHA1
66ceb1557319c662bef26b4bf79a1c517ebae667
-
SHA256
da8dc1a9a38d34ac7cb095476298a55202b6f815f98c003b03069ccb5a81bb15
-
SHA512
1a7dc4b997cba75ee5565ccc46f13a9dbdd8fd6879c1986ab6eddd1939e6cba080e05aefa7c0de117dbe207ef023baf7345fc9782d835349a3a3966694765059
-
SSDEEP
3072:b11H66Fes9BZN0+7DSIj14aVrSJ30adF0WKLQmZS4e275O3JgTQ/Lqv3gzPlLtoi:b+irnZNFxj14e030zUodeai
Malware Config
Signatures
Files
-
da8dc1a9a38d34ac7cb095476298a55202b6f815f98c003b03069ccb5a81bb15.exe windows x86
be273341718e39cc63234b31b5775926
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindClose
GetACP
GetVersionExA
DeviceIoControl
GetComputerNameA
GetComputerNameW
GetProcessHeap
GetLocaleInfoA
GetCurrentProcessId
GetTickCount
GetDriveTypeA
DeleteCriticalSection
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
QueryPerformanceCounter
VirtualFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
ExitProcess
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
RaiseException
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
CreateFileA
FlushFileBuffers
SetEndOfFile
Sleep
TerminateProcess
GetVersion
SetFileTime
GetFileTime
GetSystemDirectoryA
ReadFile
GetFileSize
GetLastError
WriteFile
SetFilePointer
CloseHandle
WaitForSingleObject
CreateSemaphoreA
FreeLibrary
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
GetSystemTimeAsFileTime
InitializeCriticalSection
HeapCreate
HeapFree
HeapAlloc
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
OutputDebugStringA
GetCurrentThreadId
GetModuleHandleA
WriteConsoleW
GetModuleFileNameA
user32
GetMessageA
wsprintfA
LoadStringA
TranslateMessage
DispatchMessageA
GetKeyNameTextA
wsprintfW
GetKeyboardLayout
MapVirtualKeyExA
MapVirtualKeyA
EnumDisplaySettingsA
advapi32
GetUserNameA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
SysAllocString
Sections
.text Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ