Static task
static1
Behavioral task
behavioral1
Sample
f78e46374959ad5d599398a57132c908c2fbfffeb4bd7dfd11c70d15b1228be2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f78e46374959ad5d599398a57132c908c2fbfffeb4bd7dfd11c70d15b1228be2.exe
Resource
win10v2004-20221111-en
General
-
Target
f78e46374959ad5d599398a57132c908c2fbfffeb4bd7dfd11c70d15b1228be2
-
Size
436KB
-
MD5
5008094767eaca5a894b74219dcd2acb
-
SHA1
9c4b28b2768cfde7fe1cb13b2f5535f613eb7c76
-
SHA256
f78e46374959ad5d599398a57132c908c2fbfffeb4bd7dfd11c70d15b1228be2
-
SHA512
fc346ec452385af4e1b6f079dabfa0be4b3d37e6044263e27dcebbc8d172c8796e84ec126a0f430863484651956e0b69e03a2d515abe120983a45e4d555e47e1
-
SSDEEP
6144:FrTOljcIlwAPOWek+2tvMkGCKNQqzOS/HxXJx2aOScvu8ZPX5GU9K:swHk+2tnhKFLclxNK
Malware Config
Signatures
Files
-
f78e46374959ad5d599398a57132c908c2fbfffeb4bd7dfd11c70d15b1228be2.exe windows x86
0dbb49c1b2412ae48a84b453a9ef574f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
ExitProcess
GetLocalTime
Sleep
MultiByteToWideChar
WideCharToMultiByte
SetFileAttributesA
GetFileAttributesA
lstrlenW
lstrlenA
DeleteFileA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
GetVersionExA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
GetTickCount
GetModuleHandleA
HeapFree
HeapAlloc
GetProcessHeap
GetCommandLineA
LockResource
FreeResource
LoadResource
SizeofResource
LoadLibraryExA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
FindClose
FindNextFileA
FindFirstFileA
GetVolumeInformationA
GetCurrentDirectoryA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
HeapSize
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
RaiseException
GetConsoleMode
GetConsoleCP
InterlockedExchange
GetThreadLocale
InitializeCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentProcess
GetLastError
SetLastError
GetFileSize
SetFilePointer
ReadFile
CreateFileA
WriteFile
FindResourceA
CloseHandle
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
HeapReAlloc
RtlUnwind
GetSystemTimeAsFileTime
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapDestroy
HeapCreate
GetStdHandle
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
user32
wsprintfA
UpdateWindow
ShowWindow
CreateWindowExA
SetTimer
GetDesktopWindow
EnumChildWindows
GetMessageA
DispatchMessageA
TranslateMessage
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
KillTimer
PostQuitMessage
PostMessageA
shell32
SHGetSpecialFolderLocation
CommandLineToArgvW
SHChangeNotify
ShellExecuteExA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
ole32
CoCreateInstance
CoUninitialize
CoInitialize
netapi32
Netbios
Sections
.text Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ