Static task
static1
Behavioral task
behavioral1
Sample
a1cc503f152d96dca9b0d7ee00b0df36529f749f3b0d8393156bd9b06d4252a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1cc503f152d96dca9b0d7ee00b0df36529f749f3b0d8393156bd9b06d4252a1.exe
Resource
win10v2004-20220901-en
General
-
Target
a1cc503f152d96dca9b0d7ee00b0df36529f749f3b0d8393156bd9b06d4252a1
-
Size
221KB
-
MD5
44db431e9275666a6237d3e4c10614b0
-
SHA1
fa305c9d202bcb08386ebbbf01f6d23af8b775ff
-
SHA256
a1cc503f152d96dca9b0d7ee00b0df36529f749f3b0d8393156bd9b06d4252a1
-
SHA512
1ea0363bf6f0b291a429f91c57cad2aa23f47cac97657611b882e1e0b9e4cb4f1a5c9205ffc628d0521acba261653eacfde7b9217d58607d5a60ddc24eacc564
-
SSDEEP
6144:IuISXOr4qxlGltTELMTWQwlH797uSsQLH5A1:IYXOr4qxlGoLMTDSsP1
Malware Config
Signatures
Files
-
a1cc503f152d96dca9b0d7ee00b0df36529f749f3b0d8393156bd9b06d4252a1.exe windows x86
696c5ea20caa6676ff8def4617cb98d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocString
SysAllocStringByteLen
VariantClear
VariantCopy
SysStringByteLen
SysFreeString
user32
CharUpperA
CharUpperW
CharNextA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExW
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
memset
memcpy
fputc
fflush
fgetc
fclose
_iob
free
malloc
memmove
memcmp
strlen
fputs
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
GetProcessTimes
VirtualAlloc
MapViewOfFile
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
OpenEventA
OpenFileMappingA
LoadLibraryW
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
FindNextFileA
FindNextFileW
FindFirstFileA
FindFirstFileW
FindClose
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
GetTempPathA
GetTempPathW
GetCurrentDirectoryA
GetCurrentDirectoryW
SetCurrentDirectoryA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
SetConsoleMode
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExW
LoadLibraryExA
SetCurrentDirectoryW
LoadLibraryA
GetModuleFileNameW
GetModuleFileNameA
LocalFree
FormatMessageW
FormatMessageA
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesW
SetFileAttributesA
RemoveDirectoryW
RemoveDirectoryA
MoveFileW
MoveFileA
CreateDirectoryW
CreateDirectoryA
DeleteFileW
DeleteFileA
GetFullPathNameW
GetFullPathNameA
UnmapViewOfFile
Sections
.text Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ