Static task
static1
Behavioral task
behavioral1
Sample
a810d3e54d8b5c26ad0735ca78f5b78a94e7085bd9572046a7597820a8b2c2e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a810d3e54d8b5c26ad0735ca78f5b78a94e7085bd9572046a7597820a8b2c2e4.exe
Resource
win10v2004-20220812-en
General
-
Target
a810d3e54d8b5c26ad0735ca78f5b78a94e7085bd9572046a7597820a8b2c2e4
-
Size
272KB
-
MD5
64416abc56e6bbe153321f0dd5eae8d9
-
SHA1
421ddc4789c8d457ed9fb88af8cf1e69779337df
-
SHA256
a810d3e54d8b5c26ad0735ca78f5b78a94e7085bd9572046a7597820a8b2c2e4
-
SHA512
f3aef09f67ca4cc5f3fb6d07483ca72bf3b0fcbc4b06f0b6ffbc3b6ca8ef5ac0d34c4eb0e9f646d122f3b8c40863bc3b329bdda62e5831d8b4665e7b9e780b9f
-
SSDEEP
3072:bIQZSzXu3gkgioUHSid1SX4wQd0047ptcRiyBXRvkzb0d4MZHEPgVJ:Mum6TSIP09vYCYzWiJ
Malware Config
Signatures
Files
-
a810d3e54d8b5c26ad0735ca78f5b78a94e7085bd9572046a7597820a8b2c2e4.exe windows x86
f33cdddd93c74e136776ceb828248472
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
IsDBCSLeadByte
InitializeCriticalSection
lstrcpyA
lstrcatA
ExitProcess
GetVersion
GetStartupInfoA
HeapReAlloc
HeapAlloc
FlushFileBuffers
SetStdHandle
SetFilePointer
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetShortPathNameA
GetProcAddress
lstrlenA
MultiByteToWideChar
lstrlenW
GetCommandLineA
GetCurrentThreadId
CreateEventA
GetLastError
CreateMutexA
CloseHandle
InterlockedIncrement
GetVersionExA
LoadLibraryA
FreeLibrary
InterlockedDecrement
lstrcpynA
GetModuleHandleA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapFree
HeapSize
LCMapStringW
LCMapStringA
GetCurrentProcess
TerminateProcess
GetOEMCP
RtlUnwind
LocalFree
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
Sleep
EnterCriticalSection
TlsSetValue
TlsAlloc
GetACP
GetCPInfo
TlsGetValue
SetLastError
RaiseException
user32
CreateWindowExA
RegisterClassA
CharNextA
RegisterWindowMessageA
PostQuitMessage
ReleaseDC
PostMessageA
GetWindowLongA
GetCursorPos
PostThreadMessageA
DefWindowProcA
DestroyMenu
SetWindowLongA
FindWindowA
GetMessageA
DestroyWindow
CreatePopupMenu
AppendMenuA
GetSystemMetrics
SetForegroundWindow
TrackPopupMenu
KillTimer
DestroyIcon
SetTimer
GetDC
DispatchMessageA
gdi32
DeleteObject
GetDIBits
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetBkColor
SetTextColor
DeleteDC
BitBlt
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
Shell_NotifyIconA
ole32
CoSuspendClassObjects
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CLSIDFromProgID
CoTaskMemAlloc
oleaut32
SysStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
VarUI4FromStr
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantClear
hccutils
LoadSTRING
LoadBITMAP
LoadIMAGE
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yrdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE