Static task
static1
Behavioral task
behavioral1
Sample
5e42ff5404aa8632852afeab9a95187be2bc8a44c37766efa2643b8f3a0bf929.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5e42ff5404aa8632852afeab9a95187be2bc8a44c37766efa2643b8f3a0bf929.exe
Resource
win10v2004-20220812-en
General
-
Target
5e42ff5404aa8632852afeab9a95187be2bc8a44c37766efa2643b8f3a0bf929
-
Size
96KB
-
MD5
ce7568e54dad53a245b51ed5cb375c7f
-
SHA1
74a1d9948fa28b4d24a332a0eb4d2a4709fdd6aa
-
SHA256
5e42ff5404aa8632852afeab9a95187be2bc8a44c37766efa2643b8f3a0bf929
-
SHA512
876792c021c2c886f3a7fd02f0616e3c65736ecac3eb47da4cf18ca42404f0f0f34632c9e6184ebf65c4b78906fbf3772bdddf2f6e7486517e7e817a944302db
-
SSDEEP
1536:JaIrL2TjvdiNB4KnrtJFNKl1fFhSwGOuyrJ9MkOzqlYw2AvN6:JaIrEvdirLmxFhThuyrJyqic
Malware Config
Signatures
Files
-
5e42ff5404aa8632852afeab9a95187be2bc8a44c37766efa2643b8f3a0bf929.exe windows x86
054144d58d7a6f30c7eafc78a21c5438
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_lopen
FindFirstFileA
lstrlenA
lstrcpyA
GetWindowsDirectoryA
lstrcatA
RemoveDirectoryA
FindNextFileA
lstrcmpA
DeleteFileA
LocalFileTimeToFileTime
DosDateTimeToFileTime
_lcreat
_lread
FindClose
FreeLibrary
GetVersionExA
GetLastError
GetCurrentProcess
GetDriveTypeW
_llseek
CloseHandle
CreateProcessA
GetTickCount
SetFileAttributesA
CopyFileA
GetModuleFileNameA
GlobalFree
GlobalAlloc
SetFileTime
GetProcAddress
LoadLibraryA
GetTimeZoneInformation
UnhandledExceptionFilter
VirtualProtect
FreeEnvironmentStringsA
HeapReAlloc
_hread
ConnectNamedPipe
_hwrite
CreateDirectoryA
_lclose
GetSystemTime
GetLocalTime
ConvertDefaultLocale
FileTimeToSystemTime
AreFileApisANSI
FileTimeToLocalFileTime
GetDriveTypeA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
TerminateProcess
GetFullPathNameA
GetLongPathNameA
GetCurrentDirectoryA
RtlUnwind
HeapFree
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
GlobalAddAtomW
SetEnvironmentVariableA
VirtualAlloc
WriteFile
HeapAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
user32
LoadIconA
wsprintfA
ExitWindowsEx
MessageBoxA
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ