Static task
static1
Behavioral task
behavioral1
Sample
02515841c3614aa32f9b6aa88ce39a8f83f0f0d9875fa089dca2b694cdc6af3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02515841c3614aa32f9b6aa88ce39a8f83f0f0d9875fa089dca2b694cdc6af3e.exe
Resource
win10v2004-20220812-en
General
-
Target
02515841c3614aa32f9b6aa88ce39a8f83f0f0d9875fa089dca2b694cdc6af3e
-
Size
109KB
-
MD5
1e9e0933a30e60f92f04afdf1c2e07b8
-
SHA1
a4d393b7cbeb7756b817555eb3ba55a3958d1468
-
SHA256
02515841c3614aa32f9b6aa88ce39a8f83f0f0d9875fa089dca2b694cdc6af3e
-
SHA512
bc87b0ad556aa6e878838304d9930f002202f777a2e69bc64198dd0586c3e4f7c905249ff33a11b331d2a524b25d3e42313b96d604381a8da35ff288683670d8
-
SSDEEP
1536:QbQtTquyqPiHFP2dNfTfFcEqU5t6Jt5TbZYFR50whQ9G11IyE2W6OGJD:9TPaHZsfTkuAJt5T1m50x+GpzG
Malware Config
Signatures
Files
-
02515841c3614aa32f9b6aa88ce39a8f83f0f0d9875fa089dca2b694cdc6af3e.exe windows x86
10c6a04bc0245f8267be367939d30ba9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
VirtualProtect
GetSystemInfo
GetLocaleInfoA
FlushFileBuffers
InterlockedIncrement
WaitForMultipleObjects
GetLastError
GetModuleHandleA
ResetEvent
HeapFree
GetProcessHeap
CreateEventW
GetStdHandle
CloseHandle
GetWindowsDirectoryA
CreateFileA
lstrcatA
user32
TranslateMessage
GetMessageW
LoadImageW
GetDC
ReleaseDC
MessageBoxW
SetWindowTextW
ShowWindow
SetDlgItemTextW
SetFocus
SendMessageW
PostThreadMessageW
GetDlgItemTextW
GetDlgItem
GetWindowTextLengthW
EnableWindow
GetWindowLongW
SetWindowLongW
SendDlgItemMessageW
GetParent
PostMessageW
LoadStringW
KillTimer
DispatchMessageW
SetTimer
PostQuitMessage
LoadCursorW
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
UpdateWindow
GetMessageA
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetSysColor
gdi32
GetObjectW
GetDeviceCaps
CreateFontIndirectW
DeleteObject
GetStockObject
Rectangle
MoveToEx
LineTo
Ellipse
RoundRect
comdlg32
GetOpenFileNameW
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetFolderPathW
SHBindToParent
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHSetLocalizedName
ole32
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoRegisterClassObject
CoRevokeClassObject
CoInitializeEx
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoUninitialize
shlwapi
StrFormatByteSizeW
StrRetToBufW
SHSetValueW
PathFindFileNameW
PathAddExtensionW
PathAppendW
PathRemoveFileSpecW
StrStrIA
PathCombineW
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ