Static task
static1
Behavioral task
behavioral1
Sample
a7de0abccd6dc2502011fb9e866034d423194d09296942caa04812cf97a43383.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a7de0abccd6dc2502011fb9e866034d423194d09296942caa04812cf97a43383.exe
Resource
win10v2004-20220901-en
General
-
Target
a7de0abccd6dc2502011fb9e866034d423194d09296942caa04812cf97a43383
-
Size
72KB
-
MD5
29384abf33b19ac9454c2d8dcd9f2c1d
-
SHA1
0a3e387eac111c446382a826c714ae73bd5369fe
-
SHA256
a7de0abccd6dc2502011fb9e866034d423194d09296942caa04812cf97a43383
-
SHA512
3176c331ccebdc8294f38205e196b5bcb15e21bef20e0467346a4c304d4252c296baf7ef590aa55245308c4236c53cbd38e1d007e9d4040b156f00b02df09f1f
-
SSDEEP
1536:w8K5rk4bbGFK1RwKgVlEJ1ABTVfBKOIlbL:w8K9nGSwDVZFxIlbL
Malware Config
Signatures
Files
-
a7de0abccd6dc2502011fb9e866034d423194d09296942caa04812cf97a43383.exe windows x86
20099a34255d9532d904d9be98622a50
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetSystemTimeAsFileTime
FlushFileBuffers
SetStdHandle
GetCurrentThreadId
GetLastError
Sleep
GetModuleFileNameA
GetShortPathNameA
MapViewOfFile
CreateFileMappingA
CreateProcessA
CreateDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
GetVersionExA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
OpenProcess
WideCharToMultiByte
RaiseException
RtlUnwind
HeapFree
GetCommandLineA
HeapAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCPInfo
ExitProcess
TerminateProcess
GetCurrentProcess
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetACP
GetOEMCP
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsBadReadPtr
IsBadCodePtr
InterlockedExchange
SetFilePointer
advapi32
StartServiceCtrlDispatcherA
RegQueryInfoKeyA
RegisterServiceCtrlHandlerA
SetServiceStatus
ControlService
DeleteService
StartServiceA
QueryServiceStatus
CreateServiceA
ChangeServiceConfig2A
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeregisterEventSource
GetUserNameA
CreateProcessAsUserA
OpenProcessToken
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ