Static task
static1
Behavioral task
behavioral1
Sample
087f9ad8a028ddea77bd3267170b4b8fe7d4335dbb9ebf2565d60ddb83a8791a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
087f9ad8a028ddea77bd3267170b4b8fe7d4335dbb9ebf2565d60ddb83a8791a.exe
Resource
win10v2004-20221111-en
General
-
Target
087f9ad8a028ddea77bd3267170b4b8fe7d4335dbb9ebf2565d60ddb83a8791a
-
Size
988KB
-
MD5
af120ad8f8ee8f95cb7a500f781205f3
-
SHA1
e4eb46afacf29fda3325abbc5ca649e1c37598cb
-
SHA256
087f9ad8a028ddea77bd3267170b4b8fe7d4335dbb9ebf2565d60ddb83a8791a
-
SHA512
a6a5e66c81b2a34cb80669a53f23ce9d60f2598c4f0005f559fb0eb347524d9efe6733ec05e79ed4d46edc20a00c09a9e57f0adba9b54611bd6ec054f240f7e2
-
SSDEEP
24576:fuGbWsTDHEGZZJ3xiKi/VsqtA5s9RkzWr:fusWeEeDi/TSs9uzo
Malware Config
Signatures
Files
-
087f9ad8a028ddea77bd3267170b4b8fe7d4335dbb9ebf2565d60ddb83a8791a.exe windows x86
3ee6fd519ddb605c37b59e86f9b6aa61
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pncrt
_controlfp
??1type_info@@UAE@XZ
fclose
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_XcptFilter
_purecall
_acmdln
exit
__dllonexit
_exit
_onexit
_CxxThrowException
__CxxFrameHandler
??1exception@@UAE@XZ
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
wcstok
_wcsdup
wcscat
wcscpy
time
vsprintf
gmtime
asctime
_ismbcspace
malloc
realloc
free
_vsnprintf
_stricmp
_mbctype
memmove
strstr
fprintf
fseek
??3@YAXPAX@Z
??2@YAPAXI@Z
wcslen
strchr
strncpy
_control87
atoi
sprintf
printf
strtok
strrchr
getenv
strtoul
fopen
_putenv
version
GetFileVersionInfoA
VerQueryValueA
kernel32
GetSystemInfo
GetCurrentProcessId
InitializeCriticalSection
SetErrorMode
LeaveCriticalSection
InterlockedExchange
EnterCriticalSection
FindFirstFileW
Sleep
OpenProcess
IsBadWritePtr
GlobalMemoryStatus
GetThreadContext
WriteFile
VirtualQuery
SetFilePointer
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThreadId
CreateThread
SetCurrentDirectoryA
SetUnhandledExceptionFilter
TerminateThread
CreateFileMappingA
GetVersion
MoveFileA
CreateDirectoryA
FindClose
CreateFileA
GetStartupInfoA
GetModuleHandleA
DeleteCriticalSection
WaitForSingleObject
ReleaseMutex
CloseHandle
GetLastError
CreateMutexA
OpenMutexA
WideCharToMultiByte
GetCommandLineW
UnmapViewOfFile
MapViewOfFile
GetVersionExA
QueryPerformanceCounter
DeleteFileA
GetModuleFileNameA
GetEnvironmentVariableA
GetTickCount
QueryPerformanceFrequency
LoadLibraryA
FreeLibrary
GetProcAddress
InterlockedIncrement
InterlockedDecrement
user32
GetClassInfoExA
DefWindowProcA
RegisterClassExA
CreateWindowExA
DestroyWindow
UnregisterClassA
GetDC
ReleaseDC
CharPrevA
CharNextA
GetSystemMetrics
wsprintfA
SendMessageA
GetPropA
EnumWindows
SetMessageQueue
PostThreadMessageA
RegisterWindowMessageA
advapi32
RegCreateKeyExA
RegEnumKeyA
RegDeleteKeyA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteValueA
RegCreateKeyA
RegSetValueA
RegQueryValueA
RegOpenKeyA
RegOpenKeyExA
ole32
OleUninitialize
OleInitialize
gdi32
GetDeviceCaps
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ