Static task
static1
Behavioral task
behavioral1
Sample
f42977d0c9735430326bc2ea28b647a61ef317665027ea6ce3e22895fb593d29.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f42977d0c9735430326bc2ea28b647a61ef317665027ea6ce3e22895fb593d29.exe
Resource
win10v2004-20220812-en
General
-
Target
f42977d0c9735430326bc2ea28b647a61ef317665027ea6ce3e22895fb593d29
-
Size
184KB
-
MD5
f8159d60eb54f32cc5e1f08c4c34b4b8
-
SHA1
b9f09f1e394315539a0e0253bb93312565bdb1c1
-
SHA256
f42977d0c9735430326bc2ea28b647a61ef317665027ea6ce3e22895fb593d29
-
SHA512
b6face6cedace5ac7804b8355d9224cab3dc3dbb433934ab2b69abfd30f9a5a88427d78125c2f5d749ba27d6b21a677b3ad50f94f4d72ebf7bd8fd5857c46e6d
-
SSDEEP
3072:6b8GZwHMnOJsrDLsvsWqmno1PHA1qu7fqyB6PID/p5UkgvmODt:6bTKsng8XsDo1PHAgu7fKQp53gvv
Malware Config
Signatures
Files
-
f42977d0c9735430326bc2ea28b647a61ef317665027ea6ce3e22895fb593d29.exe windows x86
7eac9c91be4e3b907d97923e4883d5c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoGetProcessIdentifier
GetRunningObjectTable
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
StringFromGUID2
CoCreateInstance
CoUninitialize
CoFreeUnusedLibraries
CreateItemMoniker
shlwapi
PathAddBackslashW
PathFindExtensionW
PathRemoveExtensionW
PathGetDriveNumberW
PathFileExistsW
PathFindFileNameW
ddraw
DirectDrawCreateEx
user32
SendMessageW
SetTimer
RegisterClassExW
DefWindowProcW
KillTimer
DestroyWindow
UnregisterDeviceNotification
LoadCursorW
CreateWindowExW
RegisterDeviceNotificationW
IsWindow
wsprintfW
kernel32
GetThreadLocale
GlobalFree
InterlockedCompareExchange
GetSystemDirectoryA
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
WideCharToMultiByte
WaitForSingleObject
GetCalendarInfoW
GetCurrentProcess
SetCurrentDirectoryA
GetEnvironmentVariableW
GetProfileStringW
CloseHandle
GetDateFormatW
GetModuleFileNameA
FindClose
TlsFree
TerminateProcess
InterlockedIncrement
CreateSemaphoreA
QueryPerformanceCounter
GetDateFormatA
DeleteFileW
FreeLibrary
GetLastError
ReleaseMutex
LocalAlloc
GetCurrentThread
GetFileSize
Sleep
FindNextFileA
UnhandledExceptionFilter
CreateMutexA
InterlockedExchange
GetCurrentDirectoryA
GetTickCount
EnterCriticalSection
ExitProcess
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
LoadLibraryA
DeleteCriticalSection
LeaveCriticalSection
EnumResourceNamesA
lstrcmpW
TlsSetValue
GetCurrentThreadId
GetVersionExA
MultiByteToWideChar
ReadFile
InitializeCriticalSection
GetTimeFormatW
GlobalAlloc
lstrlenW
GlobalLock
GetTempPathW
GetLocaleInfoA
GetThreadPriority
IsProcessorFeaturePresent
FindFirstFileA
GetTimeFormatA
GetFileTime
GlobalSize
IsDebuggerPresent
ReleaseSemaphore
SetUnhandledExceptionFilter
GetProcAddress
GetWindowsDirectoryA
TlsGetValue
CreateFileA
GetLocalTime
GetModuleHandleA
SetThreadPriority
GlobalUnlock
RaiseException
wmvcore
WMCreateProfileManager
advapi32
RegSetValueExW
RegCreateKeyW
RegQueryValueExW
RegOpenKeyExW
RegSetValueW
RegCloseKey
RegDeleteKeyW
RegEnumKeyExW
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ