Static task
static1
Behavioral task
behavioral1
Sample
2558d0817586306d0ddf7beadd371785cd0a0b7ed860ac62760dbbc92866008a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2558d0817586306d0ddf7beadd371785cd0a0b7ed860ac62760dbbc92866008a.exe
Resource
win10v2004-20220812-en
General
-
Target
2558d0817586306d0ddf7beadd371785cd0a0b7ed860ac62760dbbc92866008a.exe
-
Size
1015KB
-
MD5
1e9d4af109f42baa420598b1cb38d307
-
SHA1
71db2886b1dde3e92bbab3af7be627f253532736
-
SHA256
2558d0817586306d0ddf7beadd371785cd0a0b7ed860ac62760dbbc92866008a
-
SHA512
57035f5c1d022d79d525163dcfe319c4b328f9abca66a8a90ed13ac594318385100461e597eee7df651cfd1295356e7cae28bbd52cd91d71ad69376f43fd128c
-
SSDEEP
12288:yGdqKcxsQ/s3akSWFwLqNDgCvomCnY1vQL1V9k8t3/CDO2zq7byWGPoQyy6rAr8P:9qKcxsQ/s3fVLAY1UV9JYA6PzeA6H
Malware Config
Signatures
Files
-
2558d0817586306d0ddf7beadd371785cd0a0b7ed860ac62760dbbc92866008a.exe.exe windows x86
1e6f07b9f9776897a3906ee0a0569fcf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
SetUnhandledExceptionFilter
QueryPerformanceCounter
DeviceIoControl
LeaveCriticalSection
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
LoadResource
LoadLibraryA
LoadLibraryW
LocalAlloc
MulDiv
lstrcmpA
lstrlenA
lstrlenW
FindResourceA
EnumResourceLanguagesA
IsBadWritePtr
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetFileType
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCommandLineW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
DecodePointer
CreateFileA
VirtualAlloc
GetTickCount64
CreateDirectoryA
GetCommandLineA
LoadLibraryExA
GetProcAddress
FreeLibrary
GetTickCount
GetSystemDirectoryA
SleepEx
FindNextFileA
FindFirstFileA
FindClose
MoveFileExW
LCMapStringW
MultiByteToWideChar
HeapFree
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
TerminateProcess
RaiseException
RtlUnwind
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
HeapAlloc
WriteConsoleW
user32
GetDC
SendMessageA
SystemParametersInfoA
CreateIconIndirect
GetWindowThreadProcessId
FindWindowA
IntersectRect
SetRect
GetSysColor
ScreenToClient
DefWindowProcA
GetCursorPos
MessageBoxA
AdjustWindowRectEx
RedrawWindow
GetCursor
CreatePopupMenu
GetSystemMetrics
SetCapture
GetKeyState
GetDoubleClickTime
AttachThreadInput
SendMessageTimeoutA
RegisterWindowMessageA
CreateDialogParamA
PostQuitMessage
gdi32
CreatePolygonRgn
GetStockObject
CreateSolidBrush
CreateRectRgn
CreateICA
CreateFontIndirectW
CreateDCA
CreateBrushIndirect
CreateBitmap
advapi32
RegNotifyChangeKeyValue
RegEnumKeyA
RegCloseKey
RegOpenKeyA
ole32
CoInitializeEx
CoCreateGuid
shlwapi
PathFindOnPathA
PathGetDriveNumberA
ord155
StrToIntA
PathAppendA
PathFileExistsW
PathFindSuffixArrayA
Sections
.text Size: 233KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 717KB - Virtual size: 716KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ