Static task
static1
Behavioral task
behavioral1
Sample
94d939414d450aee85d078bf79ebddaab8989f77f6cf224afc3fc9534c7d1ffd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94d939414d450aee85d078bf79ebddaab8989f77f6cf224afc3fc9534c7d1ffd.exe
Resource
win10v2004-20220812-en
General
-
Target
94d939414d450aee85d078bf79ebddaab8989f77f6cf224afc3fc9534c7d1ffd
-
Size
16KB
-
MD5
0a80ad7413e737d050abd1667acb4f80
-
SHA1
ec162d308480808d59066d445f6661aac4c34e99
-
SHA256
94d939414d450aee85d078bf79ebddaab8989f77f6cf224afc3fc9534c7d1ffd
-
SHA512
119a60f9ce6efa6f5569702f64a0ae4bb4affd97d221ee4941d3d91cffcd27b58a1fc516feaa625165233649b32472cb1f783129a84dc87aa47ca100a285aa06
-
SSDEEP
384:cW50Qk0GU//THOYkwkzhERYO5EjXfJAjza4:cWrN/rYEuHjBQh
Malware Config
Signatures
Files
-
94d939414d450aee85d078bf79ebddaab8989f77f6cf224afc3fc9534c7d1ffd.exe windows x86
26713bfd71c18f163264dab9e6a2f4f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
psapi
EnumProcessModules
EnumProcesses
GetModuleBaseNameA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
CreateRemoteThread
CreateThread
DeleteFileA
ExitProcess
FindAtomA
FindClose
FindFirstFileA
GetAtomNameA
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetDriveTypeA
GetExitCodeThread
GetFileAttributesA
GetFileSize
GetLastError
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
HeapAlloc
HeapFree
HeapReAlloc
LockFileEx
MoveFileA
OpenProcess
ReadFile
SetFileAttributesA
SetFilePointer
SetFileTime
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
VirtualAllocEx
WriteFile
WriteProcessMemory
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_stricmp
abort
atexit
free
malloc
memset
puts
signal
strcat
strchr
strcmp
strcpy
strlen
strncmp
shell32
ShellExecuteA
user32
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetMessageA
KillTimer
LoadCursorA
LoadIconA
PostQuitMessage
RegisterClassExA
SetTimer
TranslateMessage
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE