Static task
static1
Behavioral task
behavioral1
Sample
975547720cec4391aef2fada35b062666642845218b30fd92358b579c513379b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
975547720cec4391aef2fada35b062666642845218b30fd92358b579c513379b.exe
Resource
win10v2004-20221111-en
General
-
Target
975547720cec4391aef2fada35b062666642845218b30fd92358b579c513379b
-
Size
428KB
-
MD5
4b3cda1d7e803993536ec0d889adefaf
-
SHA1
d8a6734d3d0c4b2a6f4f490ecaf774ec0a096a7c
-
SHA256
975547720cec4391aef2fada35b062666642845218b30fd92358b579c513379b
-
SHA512
e0098d57b897e35c0f9fc9c5066fde53892f8a6d3a249973b3fdc701e522f9101f0bf35917a6070c6704dbf993fa6f8542c2c7fa762c676d455a35c518914757
-
SSDEEP
6144:Y44YIjFrgVsKLfQtctzq4fnTCDbYh5l7Bu9zEkg5A:Y4g+WaAQzq4fnTCDbYd705EBa
Malware Config
Signatures
Files
-
975547720cec4391aef2fada35b062666642845218b30fd92358b579c513379b.exe windows x86
421ada7a8cfe0b089ee9ec6456232b39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
DeleteFileW
GetCurrentProcess
CloseHandle
DisableThreadLibraryCalls
InterlockedIncrement
ReadFile
HeapAlloc
WriteFile
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
InterlockedDecrement
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
CopyFileA
FindFirstFileA
VirtualFree
GetCurrentProcessId
VirtualAlloc
GetProcessHeap
SetFileTime
user32
MessageBoxA
advapi32
RegCreateKeyExW
RegSetValueExW
RegCloseKey
RegCreateKeyW
ole32
CoTaskMemFree
CoTaskMemAlloc
CoInitializeEx
CoCreateInstance
msvcrt
printf
shlwapi
SHGetValueW
Sections
.text Size: 404KB - Virtual size: 403KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ