Static task
static1
Behavioral task
behavioral1
Sample
a752a4ba7a7a438f4e1b8c0b0e7cdbbda3dfc83eece5dee66e88aa3b63285335.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a752a4ba7a7a438f4e1b8c0b0e7cdbbda3dfc83eece5dee66e88aa3b63285335.exe
Resource
win10v2004-20220812-en
General
-
Target
a752a4ba7a7a438f4e1b8c0b0e7cdbbda3dfc83eece5dee66e88aa3b63285335
-
Size
184KB
-
MD5
a0bfcc7df7866c4f3dd445254ec5d2b0
-
SHA1
8da4d0c18d7aae609e636556199b0fb8f4282522
-
SHA256
a752a4ba7a7a438f4e1b8c0b0e7cdbbda3dfc83eece5dee66e88aa3b63285335
-
SHA512
cff3af8427d511976547c28e52416ed439c8e7580f837bb7e3b697a111283efdb7245442dba2226e41594bfb6a19e7b452086f9c799c6212a28ea0ab999b572b
-
SSDEEP
3072:SNMW+2zxbNpVQt/9hAjXH0/1+ELhS2SkiWO9LHnJHAWZ:SNzd0lhAbHUUvh9TJH3
Malware Config
Signatures
Files
-
a752a4ba7a7a438f4e1b8c0b0e7cdbbda3dfc83eece5dee66e88aa3b63285335.exe windows x86
f699e45bdca1030b63f932ec3805dd34
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringW
user32
GetProcessWindowStation
GetThreadDesktop
LoadAcceleratorsA
LoadCursorA
LoadIconA
LoadStringW
RegisterClassA
wsprintfW
CharUpperW
ole32
CoCreateInstance
CoInitialize
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitializeSecurity
kernel32
CloseHandle
FileTimeToSystemTime
FormatMessageW
FreeLibrary
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoW
GetStdHandle
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
QueryPerformanceCounter
ReadConsoleW
ReadFile
SetConsoleMode
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualProtect
WideCharToMultiByte
WriteConsoleW
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
GetComputerNameExW
advapi32
RegOpenKeyExW
RegQueryValueExW
framedyn
??0CHString@@QAE@PBG@Z
??0CHString@@QAE@XZ
??1CHString@@QAE@XZ
??4CHString@@QAEABV0@ABV0@@Z
??4CHString@@QAEABV0@PBG@Z
??YCHString@@QAEABV0@PBG@Z
?Compare@CHString@@QBEHPBG@Z
?Find@CHString@@QBEHG@Z
?FindOneOf@CHString@@QBEHPBG@Z
?Format@CHString@@QAAXPBGZZ
?GetBufferSetLength@CHString@@QAEPAGH@Z
?GetData@CHString@@IBEPAUCHStringData@@XZ
?Left@CHString@@QBE?AV1@H@Z
?Mid@CHString@@QBE?AV1@H@Z
?ReleaseBuffer@CHString@@QAEXH@Z
?Mid@CHString@@QBE?AV1@HH@Z
mpr
WNetCancelConnection2W
WNetGetLastErrorW
secur32
GetUserNameExW
Sections
AUTO Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DGROUP Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 200B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ