Static task
static1
Behavioral task
behavioral1
Sample
da4e73245f6d8a38c92663f03d4880ed55641adca036ece5d374b9aeebbc29b8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
da4e73245f6d8a38c92663f03d4880ed55641adca036ece5d374b9aeebbc29b8.exe
Resource
win10v2004-20220901-en
General
-
Target
da4e73245f6d8a38c92663f03d4880ed55641adca036ece5d374b9aeebbc29b8
-
Size
60KB
-
MD5
01f6cda576f6d07a86013e90e6d8acb3
-
SHA1
234a2feb26c6a667e9d41679301c44bf9a18f207
-
SHA256
da4e73245f6d8a38c92663f03d4880ed55641adca036ece5d374b9aeebbc29b8
-
SHA512
91f60409f844f4ef54b922f76f256abb6b03af6411885169b9a401be2515d763ed1044092f2e31dcf817b4593ac42eb1782235b522f5edefe255a28e9f74453c
-
SSDEEP
1536:T0MVXBfgmltczmQQZfykTXH+X/sPpgoF:TXdchsfb7H+XGpgo
Malware Config
Signatures
Files
-
da4e73245f6d8a38c92663f03d4880ed55641adca036ece5d374b9aeebbc29b8.exe windows x86
5acd25f7e6d8056bfdf50c01a2a160f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
VirtualProtect
VirtualAlloc
SearchPathA
DeleteCriticalSection
GetCurrentProcessId
ExitProcess
CreateProcessA
lstrcmpA
CopyFileA
InitializeCriticalSection
GetShortPathNameA
GetWindowsDirectoryA
GetVersionExA
GetComputerNameA
GetCurrentProcess
lstrcatA
WaitForSingleObject
CreateThread
TerminateThread
CreateEventA
SetFileAttributesA
GetSystemInfo
GetDiskFreeSpaceA
GetDriveTypeA
FindClose
GetSystemDirectoryA
lstrcmpiA
FileTimeToLocalFileTime
FindFirstFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
Thread32Next
Thread32First
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
DeleteFileA
SetPriorityClass
SetEvent
ResetEvent
GetTempPathA
GetStringTypeA
ReadFile
Sleep
FreeLibrary
GlobalFree
LoadLibraryA
GetProcAddress
lstrcpyA
GetLastError
lstrlenA
CreateFileA
CloseHandle
GetFileSize
WriteFile
VirtualFree
GetModuleHandleA
LeaveCriticalSection
GetModuleFileNameA
EnterCriticalSection
FindNextFileA
lstrcpynA
FileTimeToSystemTime
GlobalMemoryStatus
HeapDestroy
GetVersion
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
GetStringTypeW
HeapFree
HeapAlloc
RtlUnwind
GetStartupInfoA
GetCommandLineA
MultiByteToWideChar
LCMapStringA
HeapCreate
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
user32
MessageBoxA
GetDesktopWindow
EnumWindows
CharToOemA
CharUpperA
ExitWindowsEx
PostMessageA
GetWindowTextA
IsWindowVisible
IsWindow
SystemParametersInfoA
wsprintfA
gdi32
CreateCompatibleDC
DeleteDC
GetDeviceCaps
SelectObject
BitBlt
CreateDIBSection
DeleteObject
CreateDCA
GetDIBColorTable
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
shell32
ShellExecuteA
winmm
timeGetTime
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.config Size: 4KB - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ