Static task
static1
Behavioral task
behavioral1
Sample
f22a447b2ef41411d97142d782d2c6a3f59ccad349dc7f35ed9eb2829bff74e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f22a447b2ef41411d97142d782d2c6a3f59ccad349dc7f35ed9eb2829bff74e9.exe
Resource
win10v2004-20221111-en
General
-
Target
f22a447b2ef41411d97142d782d2c6a3f59ccad349dc7f35ed9eb2829bff74e9
-
Size
87KB
-
MD5
f9a6f512902a8a8ae7f02e2782428feb
-
SHA1
22021c3ed1363f7388c9dc28b81a30dda4c7071a
-
SHA256
f22a447b2ef41411d97142d782d2c6a3f59ccad349dc7f35ed9eb2829bff74e9
-
SHA512
3d3a853e9e0124f582bd8fa8e320bf486aef7f80d6e609670f35726512947f4bf7021b03482d3b674746959d53fd406fe71a642118c46e387cdec0529efc5d24
-
SSDEEP
1536:ey2uKnjSfu/wkyAy9hEMsqZx4b8WHk15OkGcC4rr5jbLri10QnGJY:ev9jSJAyXEMs24b9WOkGCbC11
Malware Config
Signatures
Files
-
f22a447b2ef41411d97142d782d2c6a3f59ccad349dc7f35ed9eb2829bff74e9.exe windows x86
c3e6106e1e3aeb8cff14ba27e6694690
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
lstrcpyA
CreateProcessA
lstrcatA
GetWindowsDirectoryA
DuplicateHandle
GetCurrentProcess
OpenProcess
VirtualFree
VirtualAlloc
ReadFile
GetFileSize
CreateFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
VirtualProtectEx
lstrcmpA
CopyFileA
DeleteFileA
SetFileAttributesA
WriteFile
lstrlenA
GetSystemDirectoryA
SetFilePointer
GetModuleFileNameA
ExitProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetProcessHeap
CreateRemoteThread
SetLastError
GetCurrentProcessId
GetPriorityClass
WriteProcessMemory
Sleep
GetModuleHandleA
GetProcAddress
WaitForSingleObject
GetComputerNameA
CloseHandle
ResumeThread
user32
FindWindowA
GetWindowThreadProcessId
wsprintfA
advapi32
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
GetUserNameA
RegSetValueExA
shlwapi
SHDeleteKeyA
msvcrt
atoi
free
malloc
_strnicmp
_strrev
strrchr
strncpy
strchr
_stricmp
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE