Static task
static1
Behavioral task
behavioral1
Sample
0f53d77ad57b675b62889d78dfcd508c498c03985c27c9be4a5f90adc58610cc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f53d77ad57b675b62889d78dfcd508c498c03985c27c9be4a5f90adc58610cc.exe
Resource
win10v2004-20221111-en
General
-
Target
0f53d77ad57b675b62889d78dfcd508c498c03985c27c9be4a5f90adc58610cc
-
Size
88KB
-
MD5
22d6f356138b4c7e4cb1a81f2f6dac0d
-
SHA1
a913536ef81f985962462e98cfc41681b63c6a78
-
SHA256
0f53d77ad57b675b62889d78dfcd508c498c03985c27c9be4a5f90adc58610cc
-
SHA512
c0526f1abceb5639bebfa7697cf07a3832d06c0f8547f4a263ce3ac5e3cedf98673b4a64caae10aa7df3b140f99d5f5c38189e127a6cc95fff75614b389acb8c
-
SSDEEP
1536:B8eoI/rtXVgH3yihHtzyssIks9kNf5ffpJy5gbevyelrRyJ0w:B82/xlgXyihNzy3VxJy0evyelrRyH
Malware Config
Signatures
Files
-
0f53d77ad57b675b62889d78dfcd508c498c03985c27c9be4a5f90adc58610cc.exe windows x86
e9fe089f1902fe96fdf2f43bc3d90d1a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
ResumeThread
CloseHandle
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetModuleFileNameA
RemoveDirectoryA
DeleteFileA
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceA
lstrcmpA
MultiByteToWideChar
lstrlenA
CreateDirectoryA
GetTempFileNameA
GetTempPathA
lstrcmpiA
Sleep
WriteFile
OpenProcess
WaitForMultipleObjects
CreateEventA
SetEnvironmentVariableA
lstrcpyA
GetEnvironmentVariableA
SetFilePointer
CreateFileA
InterlockedDecrement
LoadLibraryA
FreeLibrary
GetProcAddress
LocalFree
DeleteCriticalSection
InitializeCriticalSection
GetLastError
GetSystemInfo
VirtualProtect
GetCPInfo
GetOEMCP
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
RaiseException
GetVersionExA
InterlockedExchange
GetThreadLocale
GetLocaleInfoA
GetACP
TerminateProcess
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
LCMapStringW
WideCharToMultiByte
LCMapStringA
HeapSize
IsBadWritePtr
VirtualAlloc
ExitProcess
RtlUnwind
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
SetUnhandledExceptionFilter
VirtualQuery
HeapDestroy
HeapCreate
VirtualFree
user32
MessageBoxA
advapi32
RegOpenKeyExA
RegCloseKey
wininet
InternetReadFile
shlwapi
StrStrA
PathAppendA
PathRemoveFileSpecA
wintrust
WinVerifyTrust
crypt32
CryptMsgClose
CertCloseStore
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CertGetNameStringA
rpcrt4
UuidCreate
ole32
CoInitializeEx
CoUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
VariantChangeType
VariantInit
SysFreeString
SysAllocString
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ