Static task
static1
Behavioral task
behavioral1
Sample
ead2d032378f08d2451408d1e47c9a3d912298d61b2edf3f4e589b28d4515eb5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ead2d032378f08d2451408d1e47c9a3d912298d61b2edf3f4e589b28d4515eb5.exe
Resource
win10v2004-20220812-en
General
-
Target
ead2d032378f08d2451408d1e47c9a3d912298d61b2edf3f4e589b28d4515eb5
-
Size
1.6MB
-
MD5
645f7e1335f7be5d8fd597cbd2b2436a
-
SHA1
9f89a21f0ac5ee973883b3c21e5aa9925c243edf
-
SHA256
ead2d032378f08d2451408d1e47c9a3d912298d61b2edf3f4e589b28d4515eb5
-
SHA512
94cc26216e6ea5729f8f84dd894404ab088753cc67a27e1f3e614a2ea841cbf4f51c2b58149807b90143858ad97cb1858de81b996f1bc03b13de11b55a3e2026
-
SSDEEP
24576:FeA9o/Muz5ZaMsOBAGKL2WpX+ugt6tF8TN6e5ghdDqQgZl3GSuZB1+uCT:4So/La5ESuLt5hfodO/Z9usjT
Malware Config
Signatures
Files
-
ead2d032378f08d2451408d1e47c9a3d912298d61b2edf3f4e589b28d4515eb5.exe windows x86
9777aecfb9b3152d996aa84e7f29bb00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
lstrcpyA
lstrlenA
GetModuleFileNameA
CopyFileA
SetCurrentDirectoryA
DeleteFileA
RemoveDirectoryA
GetTempPathA
MoveFileA
LoadLibraryA
GetProcAddress
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
GetACP
ReadFile
GetFileSize
GetLastError
LocalFree
FormatMessageA
GetFullPathNameW
GetFullPathNameA
GetCurrentDirectoryW
GetCurrentDirectoryA
GetTempPathW
GetModuleFileNameW
GetFileAttributesA
GetFileAttributesW
SetFilePointer
CreateDirectoryW
CreateDirectoryA
GetFileTime
FileTimeToLocalFileTime
GetTickCount
WriteFile
GetSystemTime
Sleep
IsBadReadPtr
MapViewOfFile
CreateFileMappingA
CloseHandle
UnmapViewOfFile
GetOEMCP
CreateFileA
CreateFileW
GetVersionExA
GetTimeZoneInformation
WideCharToMultiByte
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEndOfFile
SystemTimeToFileTime
GetLocalTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
InterlockedDecrement
InterlockedIncrement
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
HeapReAlloc
HeapAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
GetCPInfo
user32
DialogBoxParamW
PostQuitMessage
EndPaint
BeginPaint
SendMessageA
GetDlgItem
DispatchMessageA
TranslateMessage
DefWindowProcA
GetMessageA
LoadStringA
EndDialog
SetWindowPos
OffsetRect
CopyRect
GetWindowRect
GetDesktopWindow
SetDlgItemTextW
GetDlgItemTextW
MessageBoxA
IsDlgButtonChecked
GetDlgItemTextA
CheckRadioButton
CheckDlgButton
SetDlgItemTextA
EnableWindow
GetActiveWindow
CreateWindowExA
LoadCursorA
RegisterClassExA
comdlg32
GetOpenFileNameA
advapi32
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
GetUserNameA
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
shell32
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocStringLen
Sections
.text Size: 428KB - Virtual size: 425KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 576KB - Virtual size: 591KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 624KB - Virtual size: 620KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ