Static task
static1
Behavioral task
behavioral1
Sample
b4c0f055070b8c4896caa2e66234e2f32a61b024649f9a3c361bb545259f06e7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4c0f055070b8c4896caa2e66234e2f32a61b024649f9a3c361bb545259f06e7.exe
Resource
win10v2004-20220812-en
General
-
Target
b4c0f055070b8c4896caa2e66234e2f32a61b024649f9a3c361bb545259f06e7
-
Size
176KB
-
MD5
6e9c3cd83ae20a40167d42789a3d589b
-
SHA1
50d7364e96530c5c04bd548daee22c92daa68285
-
SHA256
b4c0f055070b8c4896caa2e66234e2f32a61b024649f9a3c361bb545259f06e7
-
SHA512
9a4fc03bfeddc36839d03f5ce746d89059000f00d1ed443df6e35623ab1bb6be7512ac2c3ec7bc8648c5043ddd6bc1faf788fd6eb7e5f73da1bfd846418620fe
-
SSDEEP
3072:TFSwte2+6R2b/fpDOkER3Gl/4QLjc3beC7zmRj5ywOmtGjx:TMwtKtTfFOkEg/9Y3H+Rj5ytsGj
Malware Config
Signatures
Files
-
b4c0f055070b8c4896caa2e66234e2f32a61b024649f9a3c361bb545259f06e7.exe windows x86
7df99aa25d4b6affc46e6c564fc4fab4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
GetThreadLocale
SetFilePointerEx
SizeofResource
SetStdHandle
WaitForSingleObject
FormatMessageA
CreateFileA
TryEnterCriticalSection
GetVersionExA
lstrlenA
GetModuleFileNameW
SetEndOfFile
GlobalUnlock
InterlockedExchange
HeapDestroy
lstrlenW
LocalFree
RaiseException
LoadResource
GetFileSizeEx
GetFileSize
FindClose
GlobalLock
GetFileAttributesW
GetFileAttributesA
InterlockedExchangeAdd
ReadFile
WaitForSingleObjectEx
SleepEx
RegisterWaitForSingleObject
FlushFileBuffers
CloseHandle
ReadFileEx
WriteFileEx
GetSystemInfo
LocalAlloc
DeleteFileA
CompareStringW
CreateEventA
FormatMessageW
GlobalAlloc
CreateThread
GetModuleHandleA
DeleteFileW
LockResource
GlobalFree
CompareStringA
InterlockedCompareExchange
CreateFileW
WaitForMultipleObjectsEx
CreateEventW
InitializeCriticalSection
SetEvent
FreeLibrary
SetErrorMode
VirtualAlloc
FindCloseChangeNotification
GetStringTypeA
LCMapStringW
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
GetCurrentThread
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
IsBadWritePtr
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
GetStringTypeW
advapi32
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetTokenInformation
LookupAccountSidA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
AllocateAndInitializeSid
RegCloseKey
CheckTokenMembership
RegCreateKeyW
IsValidSid
InitializeSecurityDescriptor
RegOpenKeyExW
OpenThreadToken
QueryServiceStatus
msi
ord223
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 237KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ