Static task
static1
Behavioral task
behavioral1
Sample
a21c52003fe48bda7e2cb29fad9fa78568c3dfbe127d85385ece9895562ce797.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a21c52003fe48bda7e2cb29fad9fa78568c3dfbe127d85385ece9895562ce797.exe
Resource
win10v2004-20220901-en
General
-
Target
a21c52003fe48bda7e2cb29fad9fa78568c3dfbe127d85385ece9895562ce797
-
Size
662KB
-
MD5
c330e3a93c3940559a40c73e23d322a8
-
SHA1
2be60eee3efcf0a71075869835b3a928e18df6e2
-
SHA256
a21c52003fe48bda7e2cb29fad9fa78568c3dfbe127d85385ece9895562ce797
-
SHA512
fc102921c030a1a28bd61ee6162c1b6a6973af14fcf42c43acecc189fd1fb1b33fac79ef09fc7d5d3f97203b9a8245aed6fb428c6ed9d88850d8d7998f983648
-
SSDEEP
12288:MaZEJEihlIZVrZPyTFo9x4fv9n2cfBCg69q88vnuPB5UqDgAp+h5bB9n:MaZ+hgPyTG9xyv9lBCg6g7vnu55A5b
Malware Config
Signatures
Files
-
a21c52003fe48bda7e2cb29fad9fa78568c3dfbe127d85385ece9895562ce797.exe windows x86
71b1ed11ae81cfd58bdd18e6af7def12
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ClipCursor
SetMenuItemBitmaps
GetSysColor
RegisterClassA
GetClipboardFormatNameA
OpenDesktopA
GetActiveWindow
SetScrollPos
SetWindowRgn
RegisterClassExA
ChangeMenuW
CreateWindowExW
SetMenuInfo
MessageBoxW
ShowWindow
comctl32
ImageList_BeginDrag
InitCommonControlsEx
CreatePropertySheetPageA
DestroyPropertySheetPage
ImageList_LoadImageA
ImageList_Replace
ImageList_DragMove
ImageList_GetFlags
kernel32
GetStdHandle
GetCurrentProcessId
GetStringTypeW
GetModuleHandleA
InterlockedIncrement
CreatePipe
InitializeCriticalSection
VirtualFree
IsValidCodePage
GetLocaleInfoA
RtlUnwind
lstrcpynA
GetEnvironmentVariableW
SetEnvironmentVariableA
GetCommandLineA
LCMapStringW
GetProcAddress
GetStartupInfoA
TlsFree
GetUserDefaultLCID
ReadFile
InterlockedDecrement
FindClose
GetCurrentProcess
GetEnvironmentStringsW
FormatMessageW
WriteFile
IsValidLocale
GetStringTypeA
GetDateFormatA
HeapAlloc
GetModuleFileNameA
GetCurrentThread
CreateFileA
EnterCriticalSection
GetConsoleCP
SetHandleCount
UnhandledExceptionFilter
FlushFileBuffers
FreeEnvironmentStringsA
GetLocaleInfoW
GetLastError
GetTimeZoneInformation
GetTickCount
IsDebuggerPresent
CreateMutexA
SetLastError
TlsAlloc
TlsSetValue
VirtualAlloc
HeapReAlloc
WriteConsoleA
GetConsoleMode
GetWindowsDirectoryW
FreeLibrary
OpenFileMappingW
GetConsoleOutputCP
QueryPerformanceCounter
HeapDestroy
InterlockedExchange
LCMapStringA
GetPrivateProfileStringW
ExitProcess
VirtualQuery
WriteConsoleW
GlobalGetAtomNameA
TerminateProcess
FreeEnvironmentStringsW
Sleep
GetACP
TlsGetValue
OpenMutexA
LeaveCriticalSection
WideCharToMultiByte
GetVersionExA
SetConsoleCtrlHandler
WriteProfileSectionW
DeleteCriticalSection
GetSystemTimeAsFileTime
SetFilePointer
GetFileType
GetOEMCP
GetCurrentThreadId
CompareStringW
GetEnvironmentStrings
GetTempFileNameW
CloseHandle
MultiByteToWideChar
EnumSystemLocalesA
SetStdHandle
SetUnhandledExceptionFilter
ReadConsoleA
GetTimeFormatA
LoadLibraryA
HeapSize
HeapFree
GetProcessHeap
CompareStringA
HeapCreate
GetCPInfo
Sections
.text Size: 309KB - Virtual size: 309KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 258KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ