Static task
static1
Behavioral task
behavioral1
Sample
95fd59f59ac4c0d97b5946c1848e02b87b93682c13276bd953b6f890f0dc9e01.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
95fd59f59ac4c0d97b5946c1848e02b87b93682c13276bd953b6f890f0dc9e01.exe
Resource
win10v2004-20220812-en
General
-
Target
95fd59f59ac4c0d97b5946c1848e02b87b93682c13276bd953b6f890f0dc9e01
-
Size
355KB
-
MD5
7c6a71940b3a6a6f663eeb21ade9e386
-
SHA1
4f6f6f1be62b78462e2d4bea8298e32f9932ad65
-
SHA256
95fd59f59ac4c0d97b5946c1848e02b87b93682c13276bd953b6f890f0dc9e01
-
SHA512
7013ed3222f494d143fb99d00e73326db9d32932113a6709741a482be3106afd78dea573dbee70bf847195da41f786c84a711bef9314abdb4340b217cb45f458
-
SSDEEP
6144:hhSldLpMGfIlfE4Auz3xTjkB2iDuiVD4J8p/KE4pM44lzqtHqc4GIYIHQCY98u:hGdLpROfBvz3a2ai2gERVGIJHbYWu
Malware Config
Signatures
Files
-
95fd59f59ac4c0d97b5946c1848e02b87b93682c13276bd953b6f890f0dc9e01.exe windows x86
4dfe4fb4bd75f2590757d0f497beab0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
GetPrivateProfileStringA
FreeResource
ReadFile
GlobalFree
GetModuleFileNameA
DosDateTimeToFileTime
GetSystemDirectoryA
LocalAlloc
FindNextFileA
GetModuleHandleA
GetPrivateProfileIntA
SetFileAttributesA
GetExitCodeProcess
FindFirstFileA
CreateProcessA
GetTempPathA
GetDiskFreeSpaceA
GetCurrentDirectoryA
GlobalSize
_llseek
GetVersionExA
GetWindowsDirectoryA
GetFileAttributesA
ExpandEnvironmentStringsA
IsDBCSLeadByte
LocalFree
LoadLibraryExA
GetLongPathNameA
ConnectNamedPipe
lstrcmpiA
GlobalUnlock
SetFilePointer
_lclose
LocalFileTimeToFileTime
FormatMessageA
SetCurrentDirectoryA
WriteFile
GetTempFileNameA
_lopen
GetProcAddress
SetFileTime
FreeLibrary
RemoveDirectoryA
SetEvent
lstrcatA
LockResource
CreateFileA
ExitProcess
lstrcpynA
DeleteFileA
GetLastError
MapViewOfFile
GetDriveTypeA
SizeofResource
GlobalLock
lstrlenA
GetSystemInfo
ResetEvent
GlobalAlloc
EnumResourceLanguagesA
TerminateThread
GetShortPathNameA
CreateEventA
LoadResource
WritePrivateProfileStringA
GetCommandLineA
FindResourceA
lstrcpyA
GetCurrentProcess
lstrcmpA
GetAtomNameA
GetVolumeInformationA
FindClose
shlwapi
PathFindFileNameW
PathFindExtensionW
ole32
DoDragDrop
RegisterDragDrop
OleDuplicateData
OleIsCurrentClipboard
RevokeDragDrop
OleFlushClipboard
advapi32
OpenProcessToken
RegOpenKeyExA
LookupAccountSidW
LookupPrivilegeValueW
AdjustTokenPrivileges
GetTokenInformation
SetEntriesInAclW
SetSecurityInfo
CreateProcessAsUserW
gdi32
CreateFontA
CreatePen
CombineRgn
SelectObject
GetTextExtentPoint32A
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
StretchBlt
DeleteObject
CreateRectRgn
crypt32
CertNameToStrW
CertEnumCertificatesInStore
CertCloseStore
CertFreeCertificateContext
CryptQueryObject
comctl32
_TrackMouseEvent
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 326KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ