Static task
static1
Behavioral task
behavioral1
Sample
677ac03d4be38d887c158d27f94004e298de113ae4ab3f664755826425155926.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
677ac03d4be38d887c158d27f94004e298de113ae4ab3f664755826425155926.exe
Resource
win10v2004-20220812-en
General
-
Target
677ac03d4be38d887c158d27f94004e298de113ae4ab3f664755826425155926
-
Size
124KB
-
MD5
b95e3af79b0b235d3e86631e5bbaa873
-
SHA1
0dcdd65267eec0134d650ccf5340f946de5e286d
-
SHA256
677ac03d4be38d887c158d27f94004e298de113ae4ab3f664755826425155926
-
SHA512
139d7453246f8043db16d410a66ea4d1248c7331c14114e3a7e0c57e705b42b03b7838cc56ce1e27aca41c5af7c6e732405eed074f91bb1a485ca3d05650daba
-
SSDEEP
1536:7f2T7qWpMGgC4SF4XugS0LmIp0mtkBiCSDpAp/kXkYlWuDs2zG6:GZpMGgCNgugS0LmITkT+pApMXDPDs2C
Malware Config
Signatures
Files
-
677ac03d4be38d887c158d27f94004e298de113ae4ab3f664755826425155926.exe windows x86
85c7583bf2e95459fafc7d600086528b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetLastError
CloseHandle
WaitForSingleObject
CreateProcessA
FreeLibrary
lstrcpyA
GetWindowsDirectoryA
lstrcatA
MoveFileExA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
lstrlenA
lstrcpynA
GetVersion
GetVersionExA
GetPrivateProfileStringA
GetSystemDirectoryA
HeapAlloc
UnhandledExceptionFilter
GetModuleFileNameA
SetEnvironmentVariableA
CompareStringW
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
lstrcmpiA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetStdHandle
HeapReAlloc
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
FlushFileBuffers
GetFileType
RtlUnwind
WriteFile
SetStdHandle
CreateFileA
SetFilePointer
SetEndOfFile
ReadFile
CompareStringA
user32
wsprintfA
advapi32
RegEnumValueA
RegDeleteValueA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
shell32
FindExecutableA
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 1023B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE