Static task
static1
Behavioral task
behavioral1
Sample
a83a10d242a2b44ac490cddf8c3b67481f63fab4a78759de56ceb290ba151699.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a83a10d242a2b44ac490cddf8c3b67481f63fab4a78759de56ceb290ba151699.exe
Resource
win10v2004-20220812-en
General
-
Target
a83a10d242a2b44ac490cddf8c3b67481f63fab4a78759de56ceb290ba151699
-
Size
568KB
-
MD5
01c89d44db6001bdb14297d5d582810e
-
SHA1
04dda886bd6e857c72b0dd4db06c773aaff60987
-
SHA256
a83a10d242a2b44ac490cddf8c3b67481f63fab4a78759de56ceb290ba151699
-
SHA512
40f577b7e13eef0caddb95347f777f4ac705e5f617f244b45e29ea66484b3dc7135a7e6b590d9045960dd69c38fcd459d4640984aaa43a392a80d8df0308230d
-
SSDEEP
6144:ZVVYoFkrfny2TzlrsipRcLxWc9Veuxh4lnDsEzekJ:1Xkrfy2Tzl3rcNW+V94
Malware Config
Signatures
Files
-
a83a10d242a2b44ac490cddf8c3b67481f63fab4a78759de56ceb290ba151699.exe windows x86
7bd3ef8005a984876c29ac4e77906501
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
kernel32
UnhandledExceptionFilter
SetEnvironmentVariableA
GetTickCount
GetModuleHandleA
GetProcAddress
LoadLibraryA
WriteProcessMemory
VirtualProtectEx
GetCurrentProcess
WaitForSingleObject
CreateThread
IsBadReadPtr
VirtualAlloc
GetLastError
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
EncodePointer
IsProcessorFeaturePresent
RaiseException
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetFullPathNameA
CloseHandle
GetFileInformationByHandle
PeekNamedPipe
GetFileType
CreateFileA
GetCurrentDirectoryW
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
ReadFile
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryW
Sleep
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetDriveTypeW
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointer
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
LCMapStringW
FlushFileBuffers
HeapReAlloc
GetStringTypeW
WriteConsoleW
CreateFileW
CompareStringW
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 495KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ