Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20221111-en
General
-
Target
8398d51e744bb833d67df9fcef681f25a55a0ac313d68a5c8a23c19182cc6d27.rar
-
Size
6.5MB
-
MD5
2fd530209afece34a195585e9b01be91
-
SHA1
793f065aa751599b5c243b9b9121a1edc10c612f
-
SHA256
8398d51e744bb833d67df9fcef681f25a55a0ac313d68a5c8a23c19182cc6d27
-
SHA512
60ea31a679a57409b2ac728d4035500825181600f4643cbf74abccf868a7364a13dfa71ec9299fe5082111dfe7a1268f68db26d02894463d4626c6ed0bb5ea65
-
SSDEEP
98304:opqmR1+kWyc8vIGAJW5opwBpTdVu2MhymM8MjeyCYlqTzi44pYP1twjP7:lM19c8AJWowBd3u2MhymMjemqvB4qPq
Malware Config
Signatures
Files
-
8398d51e744bb833d67df9fcef681f25a55a0ac313d68a5c8a23c19182cc6d27.rar.rar
Password: 2022
-
Setup.exe.exe windows x86
Password: 2022
11ea24073ee65343ee563e3160c77fde
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
DestroyWindow
CharUpperBuffW
gdi32
GetObjectW
ole32
CoDecodeProxy
Sections
.text Size: - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
./sK Size: - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.oP' Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.obQ Size: 6.5MB - Virtual size: 6.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 211KB - Virtual size: 210KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ