Static task
static1
Behavioral task
behavioral1
Sample
da60d915897774120ef901cdbe5396457672ba4b2adbd0b36d8d4acf51721e37.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da60d915897774120ef901cdbe5396457672ba4b2adbd0b36d8d4acf51721e37.exe
Resource
win10v2004-20221111-en
General
-
Target
da60d915897774120ef901cdbe5396457672ba4b2adbd0b36d8d4acf51721e37
-
Size
173KB
-
MD5
1952e98071a876ae7c69dbd52e79df82
-
SHA1
44a6704f48446d190f32844d71b94ca903be8a02
-
SHA256
da60d915897774120ef901cdbe5396457672ba4b2adbd0b36d8d4acf51721e37
-
SHA512
15cddc7b8745ae26b2e94e57399fc800a818601c20cb26095a5f6d48995550521b3a262846c3146f5193dae59b41187f071b18096376e4189b413e7b7ee5d9ce
-
SSDEEP
1536:LjehTVZo4fKVUAiGHCPc2UMoEZoSo8yIWRKHC8rVQvUKN3VnTa:LyRo4fKVUA5CmMoEZosOiBw7NlnO
Malware Config
Signatures
Files
-
da60d915897774120ef901cdbe5396457672ba4b2adbd0b36d8d4acf51721e37.exe windows x86
133d575f7f27f389360dc1d88a84f3a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDrives
GetSystemDirectoryA
GetCurrentProcessId
GetTickCount
WaitForSingleObject
CreateProcessA
TerminateProcess
GetExitCodeProcess
ReadFile
FindClose
FindNextFileA
FindFirstFileA
GetVersionExA
GlobalMemoryStatus
Beep
GetLogicalDriveStringsA
GetVolumeInformationA
GetLocalTime
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
OpenProcess
GetModuleHandleA
SetStdHandle
LoadLibraryA
GetProcAddress
GetPrivateProfileStringA
GetFileSize
DeleteFileA
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetVersion
GetCurrentProcess
CopyFileA
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
GetWindowsDirectoryA
WinExec
Sleep
SetFileAttributesA
CreateThread
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
FlushFileBuffers
user32
PostThreadMessageA
ExitWindowsEx
MessageBoxA
advapi32
ControlService
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegisterServiceCtrlHandlerA
DeleteService
CreateServiceA
ChangeServiceConfig2A
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
SetServiceStatus
StartServiceCtrlDispatcherA
ws2_32
listen
accept
WSASocketA
setsockopt
sendto
inet_addr
bind
htons
closesocket
gethostbyname
connect
inet_ntoa
send
recv
gethostname
WSACleanup
WSAStartup
socket
shlwapi
PathFileExistsA
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE