Static task
static1
Behavioral task
behavioral1
Sample
d13930d309254c9ef4fe0e26d66b1b964a6f86693fcc34640e203d0d4f15ef88.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d13930d309254c9ef4fe0e26d66b1b964a6f86693fcc34640e203d0d4f15ef88.exe
Resource
win10v2004-20221111-en
General
-
Target
d13930d309254c9ef4fe0e26d66b1b964a6f86693fcc34640e203d0d4f15ef88
-
Size
340KB
-
MD5
b3153cddeaa7e297151090f368d06821
-
SHA1
5909e0ef09c0e138579f40ed50dc745c2bf5fae3
-
SHA256
d13930d309254c9ef4fe0e26d66b1b964a6f86693fcc34640e203d0d4f15ef88
-
SHA512
20257854aa35e6cf5686cdc2d60aa9f0441d7adc49629c24aef4469a459298cb3ee88006316f9eb883487f704d20f41d30f2ee7dc2abbdb7f73b3e21132aab2c
-
SSDEEP
3072:zg4YFBr5BwQSSXram6sKCJSZKXBDNTl2aIJSWT+0WrAVReot/toVHf4:s4srwLMam4qSIZ2TtT/RflAg
Malware Config
Signatures
Files
-
d13930d309254c9ef4fe0e26d66b1b964a6f86693fcc34640e203d0d4f15ef88.exe windows x86
5d5ebf42adc7b14e3ffc09759781b5c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
lstrcpyA
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryA
CreateDirectoryA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFileAttributesA
GetVolumeInformationA
SetErrorMode
GetFileAttributesA
FindNextFileA
FindFirstFileA
lstrcatA
FindClose
GetCurrentDirectoryA
GetLocaleInfoW
SetEndOfFile
lstrcmpA
CreateProcessA
GetModuleFileNameA
GetDriveTypeA
SleepEx
lstrlenA
GetLogicalDriveStringsA
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
RaiseException
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
HeapAlloc
HeapReAlloc
TerminateProcess
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
GetLastError
WriteFile
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
GetVersionExA
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
SetStdHandle
IsBadReadPtr
IsBadCodePtr
ReadFile
GetACP
GetOEMCP
CreateFileA
SetEnvironmentVariableA
user32
ExitWindowsEx
FindWindowA
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyA
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 140KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE