Static task
static1
Behavioral task
behavioral1
Sample
68717c6112d1d07662ab77cda1508d979c05645221aa1f6aeef96f153af28a02.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68717c6112d1d07662ab77cda1508d979c05645221aa1f6aeef96f153af28a02.exe
Resource
win10v2004-20220812-en
General
-
Target
68717c6112d1d07662ab77cda1508d979c05645221aa1f6aeef96f153af28a02
-
Size
114KB
-
MD5
0bbfdecb66f00a1dbabea4b4219aa900
-
SHA1
43d7727c81c644f3b8a7d0b36f0f3754a826353d
-
SHA256
68717c6112d1d07662ab77cda1508d979c05645221aa1f6aeef96f153af28a02
-
SHA512
16dd158ab4372427fb6cf33d1f7f82f1c6ca694b65c9f1bc464d4467561bebb5c3444bcdfd343491b705da52f990e0cfa4e2bd11d2d4d2a9ccf491b824e6d138
-
SSDEEP
768:v3ZTioIq2VjAZzEGFtOf0YVbJVf/l+uVN7oGZZQh3xb8tQkavi5TLPkHTe:YbjUz9FtOfV9JVfN+uVZ2UQk5TLPkHTe
Malware Config
Signatures
Files
-
68717c6112d1d07662ab77cda1508d979c05645221aa1f6aeef96f153af28a02.exe windows x86
6b05aadd63199efe4da08d1acf2ad1c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoW
GetFileType
SetHandleCount
SetLastError
EncodePointer
HeapDestroy
HeapAlloc
HeapFree
GetFileInformationByHandle
FindNextFileW
GetModuleHandleW
FindFirstFileW
IsDebuggerPresent
DeleteFileA
CreateFileA
InterlockedExchange
Sleep
InterlockedCompareExchange
GetVersionExA
CompareStringA
DisableThreadLibraryCalls
EnumCalendarInfoA
GetACP
GetDiskFreeSpaceA
GetLocalTime
GetLocaleInfoA
GetStringTypeExA
GetThreadLocale
VirtualQuery
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
GetStdHandle
RaiseException
FreeEnvironmentStringsW
ExitProcess
FindClose
FindFirstFileA
FreeLibrary
lstrlenA
WideCharToMultiByte
InterlockedIncrement
GetVersion
LocalAlloc
VirtualAlloc
VirtualFree
LeaveCriticalSection
DeleteCriticalSection
DeleteFileW
WriteFile
CreateSemaphoreW
lstrlenW
lstrcatW
CreateFileW
GetModuleFileNameW
GetStartupInfoA
GetVersionExW
UnhandledExceptionFilter
QueryPerformanceCounter
QueryPerformanceFrequency
GetExitCodeProcess
GetModuleFileNameA
LocalFree
GetLastError
WaitForSingleObject
CloseHandle
GetModuleHandleA
CreateProcessA
GetCommandLineA
GetExitCodeThread
GetEnvironmentStringsW
EnterCriticalSection
GetCPInfo
GetOEMCP
HeapReAlloc
HeapSize
IsProcessorFeaturePresent
MultiByteToWideChar
GetStringTypeW
RtlUnwind
RemoveDirectoryW
user32
CharToOemA
CharNextA
LoadStringA
SetForegroundWindow
FindWindowW
GetKeyboardType
ExitWindowsEx
advapi32
RegQueryValueExW
OpenProcessToken
RegOpenKeyW
RegSetValueExW
AdjustTokenPrivileges
RegEnumKeyA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegOpenKeyExW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
msvcrt
_getch
getenv
isprint
malloc
strtoul
isspace
free
printf
calloc
mbstowcs
setlocale
exit
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ