Static task
static1
Behavioral task
behavioral1
Sample
a5763ba04949f56e80120ce9701adee27aea55f280f673a71b80e5a105395ce5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5763ba04949f56e80120ce9701adee27aea55f280f673a71b80e5a105395ce5.exe
Resource
win10v2004-20220812-en
General
-
Target
a5763ba04949f56e80120ce9701adee27aea55f280f673a71b80e5a105395ce5
-
Size
195KB
-
MD5
2290eecba52c53f02033a548ec003836
-
SHA1
7d3a00fb635520422a1348f9816af49646568adf
-
SHA256
a5763ba04949f56e80120ce9701adee27aea55f280f673a71b80e5a105395ce5
-
SHA512
1755557d4a952cd6a4c5107ce6d71553a479aa60d00f35de40fe5aed6e58f795a054de8f534a70761f3b14f0fe110215fb219ad693918a0ac330ddfef0a1f900
-
SSDEEP
6144:dHLOscUH+yCb+digwHk5ZRVqsqWQyF3Zl5BopmkZtcofYw1PgMwS/qDHz8idr4Nx:dHCtN1
Malware Config
Signatures
Files
-
a5763ba04949f56e80120ce9701adee27aea55f280f673a71b80e5a105395ce5.exe windows x86
bd82093d04caebfb8423731d89a6e31b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
CreateFileA
lstrcatA
VirtualAlloc
OutputDebugStringA
WriteFile
CreateFileW
GetSystemWindowsDirectoryW
CloseHandle
GetProcAddress
LoadLibraryW
FindClose
FindFirstFileW
FindNextFileW
ExpandEnvironmentStringsW
CreateDirectoryW
GetFileAttributesW
DeleteFileW
SetFileAttributesW
CopyFileW
GetSystemTimeAsFileTime
GetCommandLineW
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetLastError
GetFullPathNameW
ExitProcess
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
HeapAlloc
GetCurrentDirectoryW
LCMapStringA
WideCharToMultiByte
LCMapStringW
LoadLibraryA
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
GetDriveTypeA
GetLocaleInfoA
GetCPInfo
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
SetStdHandle
FlushFileBuffers
user32
LoadCursorW
GetSysColor
wsprintfW
LoadStringW
MessageBoxW
SetWindowPos
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
wsprintfA
GetParent
PostMessageA
DialogBoxParamA
EnableWindow
EndDialog
GetDlgItem
gdi32
GetStockObject
advapi32
RegOpenKeyExW
shell32
CommandLineToArgvW
SHBrowseForFolderA
SHGetSpecialFolderLocation
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ