Static task
static1
Behavioral task
behavioral1
Sample
0a3bdcdba59f64ec42c08f7fa5622d0ec1ea0295f9219ab21638d92b7700b944.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a3bdcdba59f64ec42c08f7fa5622d0ec1ea0295f9219ab21638d92b7700b944.exe
Resource
win10v2004-20220812-en
General
-
Target
0a3bdcdba59f64ec42c08f7fa5622d0ec1ea0295f9219ab21638d92b7700b944
-
Size
315KB
-
MD5
6dd50e456429d92bb0ed90cd12515a90
-
SHA1
7c411f94257efe5258b920a1628b9aebcf12f7c3
-
SHA256
0a3bdcdba59f64ec42c08f7fa5622d0ec1ea0295f9219ab21638d92b7700b944
-
SHA512
5ed6201d63aa626fcbc64da72344bebd3f60648c62472a0d732d4d0b3d480aa1b59ebf119dd78de87d8bd931f32f0fe304e92eb2cc906d4386b835f4c1836531
-
SSDEEP
6144:4m5iLWfv8q3YAyQlTgALXqo1jmUZxL6xQGQgg:HIWfjrPZNLXqs76P
Malware Config
Signatures
Files
-
0a3bdcdba59f64ec42c08f7fa5622d0ec1ea0295f9219ab21638d92b7700b944.exe windows x86
cbb60f30de0864b2667982647f2c481f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
SetFilePointer
GetFileSize
DeleteFileA
MoveFileA
WriteFile
ResetEvent
Sleep
LoadLibraryA
GetProcAddress
GetModuleFileNameA
RaiseException
DeleteCriticalSection
InitializeCriticalSection
GetProcessHeap
HeapFree
FindClose
GetSystemTime
SystemTimeToFileTime
FileTimeToLocalFileTime
GetDateFormatA
FileTimeToSystemTime
GetTimeFormatA
GetFileTime
CreateDirectoryA
RemoveDirectoryA
FormatMessageA
FindFirstFileA
ReadFile
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetEnvironmentVariableA
GetLogicalDriveStringsA
GetDriveTypeA
GetStringTypeExA
lstrlenA
lstrcmpA
MulDiv
GetCurrentThreadId
CreateFileA
FlushInstructionCache
LeaveCriticalSection
SizeofResource
HeapAlloc
FlushFileBuffers
GetDiskFreeSpaceA
GetModuleHandleA
GetExitCodeProcess
GetVersion
GetPrivateProfileStringA
GetTempFileNameA
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcmpiA
FindNextFileA
CreateProcessA
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcpynA
LoadLibraryExA
MultiByteToWideChar
lstrlenW
DebugBreak
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
GetStartupInfoA
ExitProcess
GetCommandLineA
FindResourceExA
LoadResource
GetCurrentProcess
LockResource
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
lstrcpyA
VirtualProtect
FindResourceA
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateEventA
SetEvent
GetExitCodeThread
WaitForSingleObject
GetLastError
CreateThread
CloseHandle
FreeLibrary
VirtualAlloc
GetSystemInfo
VirtualQuery
EnterCriticalSection
RtlUnwind
user32
CreateDialogParamA
DialogBoxParamA
PostQuitMessage
GetPropA
IsDialogMessageA
SetFocus
LoadIconA
DefWindowProcA
CallWindowProcA
SetClipboardData
LoadImageA
InvalidateRect
GetSubMenu
ShowWindow
CreateWindowExA
DestroyWindow
RemovePropA
SetPropA
IsWindow
PostMessageA
MessageBoxA
KillTimer
EnableWindow
SetTimer
EmptyClipboard
CloseClipboard
OpenClipboard
ScreenToClient
DestroyMenu
GetSystemMetrics
EnableMenuItem
GetActiveWindow
LoadStringA
SetWindowLongA
SendMessageA
EndDialog
GetWindowLongA
GetWindow
LoadMenuA
RedrawWindow
TrackPopupMenu
SystemParametersInfoA
GetWindowRect
GetParent
GetClientRect
MapWindowPoints
SetWindowTextA
GetDlgItem
UnregisterClassA
CharNextA
GetDesktopWindow
IsWindowVisible
wvsprintfA
SetWindowPos
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegDeleteValueA
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptDestroyHash
CryptDeriveKey
CryptEncrypt
CryptDestroyKey
CryptDecrypt
CryptGetProvParam
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegCreateKeyExA
RegQueryValueExA
shell32
ShellExecuteA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
ole32
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
oleaut32
VarUI4FromStr
comctl32
DestroyPropertySheetPage
CreatePropertySheetPageA
PropertySheetA
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 201KB - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE