Static task
static1
Behavioral task
behavioral1
Sample
91baf3026888c7efe7fa459ec1c93356aea4d0e07ca9e6099342cf4ffb3ca1e7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91baf3026888c7efe7fa459ec1c93356aea4d0e07ca9e6099342cf4ffb3ca1e7.exe
Resource
win10v2004-20221111-en
General
-
Target
91baf3026888c7efe7fa459ec1c93356aea4d0e07ca9e6099342cf4ffb3ca1e7
-
Size
92KB
-
MD5
67b659eca48d111826c6cc7d4aeda910
-
SHA1
eab5df43a02f100b4fb19641ba6f02e5d85110a2
-
SHA256
91baf3026888c7efe7fa459ec1c93356aea4d0e07ca9e6099342cf4ffb3ca1e7
-
SHA512
c7916d4b7835bb0962a67ed2df2a022e2e913342cd5e7bd2e0a2ddec0068c7e4cb247870819b0b3be9ca37d34d893ade7b72d10b12d7bfa87bbcef0b9539304a
-
SSDEEP
768:jCNJ1+WdgX5E/RNVSotB6y5bd9tgGo6/dDskOktER19IBtS+/1ACLHHVBysNd2BW:+B9AE/RTS6ZdKBkN8196N/1RnVgBb
Malware Config
Signatures
Files
-
91baf3026888c7efe7fa459ec1c93356aea4d0e07ca9e6099342cf4ffb3ca1e7.exe windows x86
f4d85d9dae0209987fa6b97825fb936f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapSize
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
DeleteFileA
LocalFree
GetTempPathA
CloseHandle
WinExec
GetDiskFreeSpaceExA
FindNextFileA
GetModuleFileNameA
FindClose
GlobalFree
SetFileAttributesA
FindFirstFileA
GetTempPathW
GetModuleFileNameW
ReadFile
Beep
GetFileAttributesA
Sleep
GlobalAlloc
GetWindowsDirectoryA
WriteFile
GetLogicalDrives
WaitForSingleObject
CreateDirectoryW
GetCurrentProcess
SetFilePointer
GetFileSize
CreateFileA
MultiByteToWideChar
GetComputerNameA
RaiseException
HeapReAlloc
VirtualAlloc
RtlUnwind
InitializeCriticalSection
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
ExitThread
GetCurrentThreadId
GetLastError
CreateThread
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
ExitProcess
GetStdHandle
FreeEnvironmentStringsA
user32
RegisterClassExA
TranslateMessage
DestroyWindow
PostQuitMessage
LoadIconA
ExitWindowsEx
MessageBoxA
InvalidateRect
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetSystemMetrics
GetMessageA
LoadImageA
LoadCursorA
FindWindowA
gdi32
MoveToEx
BitBlt
LineTo
DeleteDC
GetDeviceCaps
GetDIBits
AngleArc
CreateDCA
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
Ellipse
EndPath
CreatePen
GetStockObject
CreateSolidBrush
StrokeAndFillPath
BeginPath
advapi32
FreeSid
AllocateAndInitializeSid
SetNamedSecurityInfoW
LookupPrivilegeValueA
SetNamedSecurityInfoA
SetEntriesInAclA
OpenProcessToken
AdjustTokenPrivileges
shell32
SHGetFolderPathA
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
oleaut32
SysFreeString
SysStringLen
SysAllocString
netapi32
NetShareAdd
NetShareDel
ws2_32
WSASendTo
WSAAddressToStringA
listen
WSASocketA
closesocket
bind
WSACleanup
setsockopt
shutdown
WSAAccept
WSARecvFrom
htons
WSASend
htonl
WSAStartup
WSAIoctl
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
VLDR Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ