Static task
static1
Behavioral task
behavioral1
Sample
a4479e5effcc690f58c1ef22f14c50236675da5033f2ef2aa4d858cbc6cc20ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4479e5effcc690f58c1ef22f14c50236675da5033f2ef2aa4d858cbc6cc20ca.exe
Resource
win10v2004-20220812-en
General
-
Target
a4479e5effcc690f58c1ef22f14c50236675da5033f2ef2aa4d858cbc6cc20ca
-
Size
132KB
-
MD5
65b2544ad23146b376c85c6ed6174100
-
SHA1
3668681b3735e324e27a665d01a1c9a10c800579
-
SHA256
a4479e5effcc690f58c1ef22f14c50236675da5033f2ef2aa4d858cbc6cc20ca
-
SHA512
1ddc116769385a0524bf77df37f6c46dd5779ada722fd024bde0ebf6a03a1f388458e38a2594426eb67257956082f7c7684b752157e8552a7d69fea0ce25e3b3
-
SSDEEP
3072:k+QKmc901gJeP+g5kZQfWG+o4NOjPfxDycKP/hMQAMNwd:PXGgkGg5kZGWGeOjxUTi
Malware Config
Signatures
Files
-
a4479e5effcc690f58c1ef22f14c50236675da5033f2ef2aa4d858cbc6cc20ca.exe windows x86
42dc93f01170200e1b866c6a5278b333
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateFileA
GetWindowsDirectoryA
WriteFile
CopyFileA
GetCurrentDirectoryA
lstrcatA
lstrcpyA
LocalFree
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
SetEvent
GetOEMCP
GetACP
GetLastError
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetFilePointer
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
IsBadCodePtr
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
VirtualAlloc
CloseHandle
DeleteFileA
Sleep
GetCPInfo
VirtualFree
HeapFree
HeapReAlloc
HeapAlloc
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
LoadLibraryA
OutputDebugStringA
GetStdHandle
DebugBreak
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
SetEndOfFile
RtlUnwind
WideCharToMultiByte
IsBadWritePtr
IsBadReadPtr
HeapValidate
InterlockedDecrement
InterlockedIncrement
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
user32
GetClientRect
EndDialog
BeginPaint
GetWindowRect
SetWindowPos
EndPaint
PostQuitMessage
DefWindowProcA
ClientToScreen
TrackPopupMenu
DestroyWindow
DialogBoxParamA
CreateWindowExA
ShowWindow
LoadIconA
LoadCursorA
RegisterClassExA
MessageBoxA
LoadStringA
GetSystemMenu
LoadAcceleratorsA
GetMenu
EnableMenuItem
InvalidateRect
UpdateWindow
LoadMenuA
GetSubMenu
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PostMessageA
gdi32
CreateCompatibleBitmap
SelectObject
SetPixel
StretchBlt
DeleteObject
DeleteDC
CreateCompatibleDC
comdlg32
GetSaveFileNameA
ole32
CoGetMalloc
CoCreateInstance
CoUninitialize
CreateBindCtx
MkParseDisplayName
CoInitialize
oleaut32
SysAllocString
SysStringLen
SysFreeString
ksproxy.ax
KsSynchronousDeviceControl
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE