Static task
static1
Behavioral task
behavioral1
Sample
97fe08645ac880cf5ef6fe53d98aa9b878757921a5fb0e82ceb7555c1e522acf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97fe08645ac880cf5ef6fe53d98aa9b878757921a5fb0e82ceb7555c1e522acf.exe
Resource
win10v2004-20220812-en
General
-
Target
97fe08645ac880cf5ef6fe53d98aa9b878757921a5fb0e82ceb7555c1e522acf
-
Size
428KB
-
MD5
694589de012cfeee1977914e6b39eda6
-
SHA1
75fabb2a98c51108e9df05d11daddc32f02a2f59
-
SHA256
97fe08645ac880cf5ef6fe53d98aa9b878757921a5fb0e82ceb7555c1e522acf
-
SHA512
264268996bc1decc8e17ad1575b99a7c66a0bc3d009b1240d080813c2e57909e5a11c580482efbbdce39b9a84f4c0f85165a4498644ad9588c67657fd8712835
-
SSDEEP
6144:fk/LTJTamFo8gccbzH2c25aT66yZ/afALXqo1jmUZxL6xQGQo:IRa1T2iqZLXqs765
Malware Config
Signatures
Files
-
97fe08645ac880cf5ef6fe53d98aa9b878757921a5fb0e82ceb7555c1e522acf.exe windows x86
d59127e02661adf95993888a206f160e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathAppendW
PathIsDirectoryW
PathRemoveFileSpecW
kernel32
GetModuleFileNameW
GetModuleFileNameA
CreateFileW
GetSystemTime
GetFileSize
FindNextFileW
FreeLibrary
MultiByteToWideChar
LoadLibraryW
FindClose
LoadLibraryA
RemoveDirectoryW
GetLastError
CloseHandle
FindFirstFileW
GetProcAddress
DeleteFileW
GetPrivateProfileStringW
CreateThread
TerminateThread
Sleep
lstrlenA
CreateMutexW
WideCharToMultiByte
OpenMutexW
WaitForSingleObject
OpenEventW
OpenFileMappingW
MapViewOfFile
SetEvent
ResetEvent
UnmapViewOfFile
ReleaseMutex
CreateFileA
GetFileAttributesW
CreateEventW
SetThreadPriority
GetCurrentThread
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
SetEndOfFile
CompareStringA
CompareStringW
SetEnvironmentVariableA
lstrlenW
InterlockedIncrement
WriteConsoleA
SetStdHandle
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
IsValidCodePage
GetOEMCP
GetThreadLocale
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
GetModuleHandleA
ExitProcess
RtlUnwind
RaiseException
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetConsoleCP
GetConsoleMode
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetFilePointer
ReadFile
FlushFileBuffers
HeapSize
GetTimeZoneInformation
GetACP
advapi32
RegCreateKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExA
shell32
SHGetFolderPathW
ole32
CoUninitialize
CoCreateGuid
CoInitialize
wininet
InternetCloseHandle
InternetOpenW
InternetConnectW
HttpOpenRequestW
HttpSendRequestW
InternetSetOptionW
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 204KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE