Static task
static1
Behavioral task
behavioral1
Sample
517175580701691b992e148a90453afc201f8055286ef0151987e3a04440e7d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
517175580701691b992e148a90453afc201f8055286ef0151987e3a04440e7d1.exe
Resource
win10v2004-20220812-en
General
-
Target
517175580701691b992e148a90453afc201f8055286ef0151987e3a04440e7d1
-
Size
237KB
-
MD5
70cce139345c00d51a3eba864002dd65
-
SHA1
04cb65db0ae6470b2cbce7ad8130b506638778de
-
SHA256
517175580701691b992e148a90453afc201f8055286ef0151987e3a04440e7d1
-
SHA512
56fbb19aed69ca26714b94bf358729a3606a91a696b552a38ada84e8b17840139a967e04b6018865afe80e6376da05a8d58a0a6a10f39d4b6bb0d6c2471b01d3
-
SSDEEP
3072:wahi/dcUUYL+pbnfw8hTu2CY9mrAuHYX1kSCoISUZJ7ZZqg3ZWZcVG9m:sIYIfw12ZqU8oIS0FZb3ZE/Y
Malware Config
Signatures
Files
-
517175580701691b992e148a90453afc201f8055286ef0151987e3a04440e7d1.exe windows x86
2a85885bb934ef9b02326a895c41e948
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetStringTypeA
GetCPInfo
lstrcpynA
FreeLibrary
LoadResource
CreateProcessW
HeapAlloc
SetUnhandledExceptionFilter
LoadLibraryExW
GetCurrentProcess
QueryPerformanceCounter
HeapFree
GetEnvironmentStringsW
WaitForSingleObject
SetEvent
GetModuleHandleW
GetTickCount
VirtualFree
GetSystemTimeAsFileTime
WriteFile
GetCommandLineA
InitializeCriticalSection
SetHandleCount
TlsSetValue
GetEnvironmentStrings
GetConsoleCP
WideCharToMultiByte
Sleep
CreateEventA
HeapDestroy
LeaveCriticalSection
GetFileAttributesA
HeapCreate
GetFileAttributesW
TerminateProcess
FileTimeToSystemTime
ReadFile
GetModuleFileNameW
GetTimeZoneInformation
CreateFileW
GetEnvironmentVariableA
CompareStringW
GetACP
MultiByteToWideChar
FlushFileBuffers
RaiseException
GetStartupInfoA
GetStdHandle
GetLastError
SetLastError
lstrcmpiA
GetThreadLocale
GetProcAddress
VirtualAlloc
HeapSize
TlsGetValue
FindClose
LoadLibraryA
WriteConsoleA
UnhandledExceptionFilter
CreateFileMappingA
LocalAlloc
GetFileType
GetOEMCP
FindNextFileA
GetModuleHandleA
IsDebuggerPresent
FreeEnvironmentStringsW
GetStringTypeW
GetCurrentDirectoryA
CompareStringA
DeleteCriticalSection
GetCurrentThreadId
DuplicateHandle
GetVersionExA
CloseHandle
GetVersion
GetCurrentProcessId
TlsFree
LCMapStringW
DeleteFileA
CreateThread
GetProcessHeap
IsBadReadPtr
VirtualProtect
FindResourceA
SizeofResource
LockResource
WriteConsoleW
GetConsoleOutputCP
GetConsoleMode
GetLocaleInfoW
LCMapStringA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
InitializeCriticalSectionAndSpinCount
RtlUnwind
IsValidCodePage
FreeEnvironmentStringsA
GetModuleFileNameA
InterlockedDecrement
InterlockedIncrement
TlsAlloc
HeapReAlloc
lstrlenA
SetFilePointer
FindFirstFileW
CreateFileA
EnterCriticalSection
ExitProcess
SetStdHandle
user32
DestroyWindow
SetCursor
GetMessageA
PostQuitMessage
SetCapture
SetForegroundWindow
IsWindowEnabled
SetFocus
SendMessageA
TranslateMessage
SetWindowLongA
MessageBoxA
InvalidateRect
PeekMessageA
ReleaseDC
EnableMenuItem
GetDlgItem
DefWindowProcA
GetDesktopWindow
GetSysColor
SetWindowPos
GetCursorPos
IsWindow
IsWindowVisible
LoadCursorA
gdi32
GetDeviceCaps
DeleteObject
SelectObject
SetTextColor
SetBkMode
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ