Static task
static1
Behavioral task
behavioral1
Sample
5e9f26664314d4533c855032feaf2a1f169de185b0ccb9c3639bb3bbe778ba38.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5e9f26664314d4533c855032feaf2a1f169de185b0ccb9c3639bb3bbe778ba38.exe
Resource
win10v2004-20220812-en
General
-
Target
5e9f26664314d4533c855032feaf2a1f169de185b0ccb9c3639bb3bbe778ba38
-
Size
397KB
-
MD5
0f7bd2caa556098d8efce243050394f0
-
SHA1
8f1b05b5f4d43f3b08143a00318458896cda4f6d
-
SHA256
5e9f26664314d4533c855032feaf2a1f169de185b0ccb9c3639bb3bbe778ba38
-
SHA512
25ec46e0123d19c29849250fa46820c5d1e87a58e71cc155006d9d09ec3cb7be36244c9a99f60cd7a092c88f3178c9cd7538aba6992b2ba983111e6c2ed8db38
-
SSDEEP
6144:031Rexccq3ikVJ/UT9s8F2aYBqTkmJEGN1BCahkYhpbz5Kjtb5DPJGyjZ4gchgp3:0FRexccOOBFxBAmbwYhB8XsyjZ
Malware Config
Signatures
Files
-
5e9f26664314d4533c855032feaf2a1f169de185b0ccb9c3639bb3bbe778ba38.exe windows x86
7873997d304732364fb461ff37f0c776
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadStringA
wsprintfA
MessageBoxA
kernel32
InitializeCriticalSection
LocalAlloc
LocalFree
LeaveCriticalSection
IsBadWritePtr
DisableThreadLibraryCalls
GetProcAddress
EnterCriticalSection
lstrcpynA
lstrlenA
ExpandEnvironmentStringsA
lstrcpyA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
LoadLibraryA
GetFileType
GetStartupInfoA
GetStdHandle
HeapCreate
VirtualFree
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
HeapAlloc
HeapFree
VirtualAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapDestroy
advapi32
RegEnumKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegEnumValueA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0e3c Size: 512B - Virtual size: 218B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1oqp Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.15as Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.a9as Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.klkl Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.psi Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.teta Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ks1 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1231 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1237 Size: 512B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zetaa Size: 358KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zeta0 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tetaX Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1324 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.1724 Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.9182 Size: 512B - Virtual size: 70B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.9381 Size: 512B - Virtual size: 158B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ