Static task
static1
Behavioral task
behavioral1
Sample
468200d4d207a7cc1df245b9670fcf9e3c491dd344643cd7edcf8a82f2cde214.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
468200d4d207a7cc1df245b9670fcf9e3c491dd344643cd7edcf8a82f2cde214.exe
Resource
win10v2004-20221111-en
General
-
Target
468200d4d207a7cc1df245b9670fcf9e3c491dd344643cd7edcf8a82f2cde214
-
Size
284KB
-
MD5
f5f6cbbf839edd829468ad270ac44291
-
SHA1
66ebda2b8a25c68afddd76aed014ff6ec6e35b77
-
SHA256
468200d4d207a7cc1df245b9670fcf9e3c491dd344643cd7edcf8a82f2cde214
-
SHA512
4caecb5e61886460c581d0bbaac239b8cf534b80c4673d18c992c5b1a207e1815b23e38772f4a4871c65e2abecb60ad5cbe4970779268248e528f96bf01de10e
-
SSDEEP
3072:kVTJvxFMSfYClaK1r/uTwTJOJp8TDNYFh9:6nFrY88ElCy/639
Malware Config
Signatures
Files
-
468200d4d207a7cc1df245b9670fcf9e3c491dd344643cd7edcf8a82f2cde214.exe windows x86
7f1f7be6888fdc9e276f475718232005
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_lopen
FindFirstFileA
lstrlenA
lstrcpyA
GetWindowsDirectoryA
lstrcatA
RemoveDirectoryA
FindNextFileA
lstrcmpA
DeleteFileA
ConvertDefaultLocale
LocalFileTimeToFileTime
DosDateTimeToFileTime
_lcreat
_lread
FindClose
FreeLibrary
GetVersionExA
GetLastError
GetCurrentProcess
_llseek
CloseHandle
CreateProcessA
GetTickCount
GetDriveTypeW
SetFileAttributesA
CopyFileA
GetModuleFileNameA
GlobalFree
GlobalAlloc
SetFileTime
GetProcAddress
LoadLibraryA
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
HeapReAlloc
_hread
_hwrite
CreateDirectoryA
_lclose
GetSystemTime
GlobalAddAtomW
GetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
GetLongPathNameA
TerminateProcess
GetFullPathNameA
GetCurrentDirectoryA
RtlUnwind
HeapFree
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
SetEnvironmentVariableA
VirtualAlloc
WriteFile
ConnectNamedPipe
HeapAlloc
MultiByteToWideChar
LCMapStringA
VirtualProtect
LCMapStringW
GetStringTypeA
GetStringTypeW
AreFileApisANSI
CompareStringA
CompareStringW
user32
LoadIconA
wsprintfA
ExitWindowsEx
MessageBoxA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ