Static task
static1
Behavioral task
behavioral1
Sample
a4629bec6cff0784a66f7d1cd1c3d7759d31ee4afb063ffbfc32fdefb84cb6df.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4629bec6cff0784a66f7d1cd1c3d7759d31ee4afb063ffbfc32fdefb84cb6df.exe
Resource
win10v2004-20220901-en
General
-
Target
a4629bec6cff0784a66f7d1cd1c3d7759d31ee4afb063ffbfc32fdefb84cb6df
-
Size
151KB
-
MD5
2b4dc4aee0b7522b5b26f6e732983aec
-
SHA1
78bbc3f7eba158c933603bd725f221a4aefea77e
-
SHA256
a4629bec6cff0784a66f7d1cd1c3d7759d31ee4afb063ffbfc32fdefb84cb6df
-
SHA512
a429a55a3638abb2b93aeb5533f8dd7c9e381daba9dccb81f3291e0a4d9f9fc26e0c61a1864cc6086aecfaab86d099f307da16acb4bbdd996caab77035b5487f
-
SSDEEP
3072:pHCgPmrMknSJIQS5d85yiN3dP5M2I4HfFba7biyP8CO3hO1fYVo:AFrxSIQu85yY3jI4HfF2iTCO3hO1fYVo
Malware Config
Signatures
Files
-
a4629bec6cff0784a66f7d1cd1c3d7759d31ee4afb063ffbfc32fdefb84cb6df.exe windows x86
efc40b6c45aeb829dfcd38a2f951db46
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
DeleteFileA
SetFileAttributesA
SetFileTime
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetFileAttributesA
GetFileTime
GetSystemDirectoryA
GetModuleHandleA
FreeLibrary
GetProcAddress
LoadLibraryA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
WaitForSingleObject
CreateThread
HeapFree
GetProcessHeap
HeapAlloc
CreateEventA
OpenEventA
GetLastError
WriteFile
SetFilePointer
SetEndOfFile
CloseHandle
CreateFileA
Sleep
GetModuleFileNameA
MultiByteToWideChar
GetVersionExA
WideCharToMultiByte
RtlUnwind
RaiseException
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
LCMapStringA
LCMapStringW
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
VirtualAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
HeapSize
user32
MessageBoxA
advapi32
RegDeleteValueA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
ShellExecuteA
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ