Static task
static1
Behavioral task
behavioral1
Sample
b75e9a3440abc55c40f44a087b35e6e3606225cd19b1b6dbfb7b0b56a64c3b31.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b75e9a3440abc55c40f44a087b35e6e3606225cd19b1b6dbfb7b0b56a64c3b31.exe
Resource
win10v2004-20220812-en
General
-
Target
b75e9a3440abc55c40f44a087b35e6e3606225cd19b1b6dbfb7b0b56a64c3b31
-
Size
288KB
-
MD5
792cc369d93ad44fdb25e11b157fe9f0
-
SHA1
3da85839cf6ccdb043e9b4c43b86340bfa9b6e19
-
SHA256
b75e9a3440abc55c40f44a087b35e6e3606225cd19b1b6dbfb7b0b56a64c3b31
-
SHA512
bfb6472173333ccae039fd2c999efc41f720a962b42d2079dc4db199ddd890a88ce08e6661c809b341f7467da99e530b77599baadbd3c64353d20a1855ac100b
-
SSDEEP
6144:uGJsuMfOhS/+9lkbqiTixEx/plv3vld4thFEpmm5aVt:uGiurhfuTHJdCBEtit
Malware Config
Signatures
Files
-
b75e9a3440abc55c40f44a087b35e6e3606225cd19b1b6dbfb7b0b56a64c3b31.exe windows x86
900e8610d734035c52241035c0909b26
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringW
ole32
CoCreateGuid
CoInitialize
CoUninitialize
kernel32
CloseHandle
CreateFileA
DeleteFileA
DeleteFileW
FormatMessageA
FreeEnvironmentStringsA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetDiskFreeSpaceA
GetLastError
GetModuleHandleA
GetProcAddress
GetTickCount
GetVersionExA
GlobalMemoryStatus
LoadLibraryA
MultiByteToWideChar
QueryPerformanceCounter
SetErrorMode
VirtualProtect
WideCharToMultiByte
WriteFile
lstrlenA
FreeLibrary
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
user32
LoadStringA
SendMessageA
DialogBoxParamA
wininet
InternetQueryOptionA
ulib
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0ARRAY@@QAE@XZ
??0CLASS_DESCRIPTOR@@QAE@XZ
??0DSTRING@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
??0PATH@@QAE@XZ
??0PROGRAM@@IAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??1ARGUMENT_LEXEMIZER@@UAE@XZ
??1ARRAY@@UAE@XZ
??1DSTRING@@UAE@XZ
??1OBJECT@@UAE@XZ
??1PROGRAM@@UAE@XZ
??1STRING_ARGUMENT@@UAE@XZ
?Compare@OBJECT@@UBEJPBV1@@Z
?DisplayMessage@PROGRAM@@UBAEKW4MESSAGE_TYPE@@PADZZ
?DisplayMessage@PROGRAM@@UBEEKW4MESSAGE_TYPE@@@Z
?DoParsing@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Fatal@PROGRAM@@UBAXKKPADZZ
?Fatal@PROGRAM@@UBEXXZ
?GetStandardError@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardInput@PROGRAM@@UAEPAVSTREAM@@XZ
?GetStandardOutput@PROGRAM@@UAEPAVSTREAM@@XZ
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@CLASS_DESCRIPTOR@@QAEEXZ
?Initialize@FLAG_ARGUMENT@@QAEEPAD@Z
?Initialize@STRING_ARGUMENT@@QAEEPAD@Z
?Initialize@WSTRING@@QAEEPBDK@Z
?IsValueSet@ARGUMENT@@QAEEXZ
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
?Put@ARRAY@@UAEEPAVOBJECT@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?Usage@PROGRAM@@UBEXXZ
?ValidateVersion@PROGRAM@@UBEXKK@Z
?QueryFile@SYSTEM@@SGPAVFSN_FILE@@PBVPATH@@EPAE@Z
ntdll
RtlFreeHeap
RtlAllocateHeap
Sections
AUTO Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc2 Size: 189B - Virtual size: 189B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc4 Size: 202B - Virtual size: 202B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc3 Size: 289B - Virtual size: 289B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE