Static task
static1
Behavioral task
behavioral1
Sample
905a07e8963b048352c5598a37f158d8cb3fab61e056e6385e66aa6394c7a9b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
905a07e8963b048352c5598a37f158d8cb3fab61e056e6385e66aa6394c7a9b8.exe
Resource
win10v2004-20220901-en
General
-
Target
905a07e8963b048352c5598a37f158d8cb3fab61e056e6385e66aa6394c7a9b8
-
Size
116KB
-
MD5
700ad9628519d55c894f36d1f0494b36
-
SHA1
df1f1f7dd27080563a87aacf8aa41ca074a0abe0
-
SHA256
905a07e8963b048352c5598a37f158d8cb3fab61e056e6385e66aa6394c7a9b8
-
SHA512
cbfd79e111e9e914463b5511707a42f8776c1a57cd2e52167d1e00b77346b740b56fc166f96e9f014b8659fcfdd8f3e3b74d7e6fff5bdb028a4787c6479dbfbc
-
SSDEEP
3072:KUSlK1VqOiMN9P7WUF7oZGurO9wI/LiwI:EFOiE7WUFH2O9wI2wI
Malware Config
Signatures
Files
-
905a07e8963b048352c5598a37f158d8cb3fab61e056e6385e66aa6394c7a9b8.exe windows x86
ecad5d02fe12920d9df8cb3f31fd7b73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
WinExec
TerminateProcess
OutputDebugStringA
CreateThread
QueryDosDeviceA
GetLogicalDriveStringsA
Sleep
GetPrivateProfileStringA
FindClose
lstrlenA
ReleaseMutex
CreateMutexA
DeleteFileA
GetCurrentProcessId
UnmapViewOfFile
GetFileSize
MapViewOfFile
CreateFileMappingA
CreateFileA
ExitProcess
SetUnhandledExceptionFilter
TerminateThread
GetPrivateProfileIntA
WritePrivateProfileStringA
CreateProcessA
GetCurrentThreadId
WriteFile
GetLocalTime
LoadResource
FindResourceA
lstrcatA
lstrcpyA
SetThreadPriority
GetCurrentThread
ReadFile
SetFilePointer
SetFileAttributesA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GlobalMemoryStatus
CreateProcessW
WritePrivateProfileStringW
GetPrivateProfileIntW
GetPrivateProfileStringW
SetEnvironmentVariableA
CompareStringW
CompareStringA
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetFileType
FindFirstFileA
GetCurrentProcess
OpenProcess
GetLastError
GetCommandLineA
GetVersion
ReadProcessMemory
GetProcAddress
CloseHandle
LoadLibraryA
SizeofResource
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
RaiseException
GetStartupInfoA
GetModuleHandleA
GetSystemTime
GetTimeZoneInformation
HeapAlloc
HeapFree
RtlUnwind
LocalFree
MultiByteToWideChar
WideCharToMultiByte
user32
wsprintfA
SendMessageA
FindWindowExA
PostMessageA
MessageBoxA
SetThreadDesktop
IsWindow
wsprintfW
CreateDesktopA
GetThreadDesktop
FindWindowA
advapi32
SetEntriesInAclA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHGetPathFromIDListA
SHChangeNotify
SHGetSpecialFolderLocation
ole32
CoUninitialize
OleRun
CoInitialize
CoCreateInstance
oleaut32
VariantClear
GetErrorInfo
SysAllocString
SysFreeString
VariantCopy
VariantInit
psapi
EnumProcesses
GetModuleFileNameExA
shlwapi
SHDeleteKeyA
PathFindFileNameA
PathRemoveExtensionA
SHDeleteValueA
PathRemoveFileSpecA
netapi32
Netbios
wininet
InternetConnectA
InternetOpenA
HttpOpenRequestA
HttpSendRequestA
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ