Static task
static1
Behavioral task
behavioral1
Sample
51a700a8382c4802778fceb1067a59abaf3f05931b91700014397f17f8d569f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
51a700a8382c4802778fceb1067a59abaf3f05931b91700014397f17f8d569f9.exe
Resource
win10v2004-20220812-en
General
-
Target
51a700a8382c4802778fceb1067a59abaf3f05931b91700014397f17f8d569f9
-
Size
461KB
-
MD5
a161c2ebb2cebe12fcfeda8b3cb78500
-
SHA1
8e35091a4a3b299905f837d45379c8b6d50c1d28
-
SHA256
51a700a8382c4802778fceb1067a59abaf3f05931b91700014397f17f8d569f9
-
SHA512
0c0b6d9d4a61078ef1d5299921abb6971866db75cdfa3f6160d8dc627dc03064cf333d5b04b8fdd17e0f72b8acc8b97e2f8b06e02b4a048d566dd16daae28761
-
SSDEEP
6144:NDmEPiNRIesS/K6maE6qbmgyuCSvb5bRVDKnemd0jhttjqemzWSV0EnLegGJc:ZCNc2maKESvFL4em6jtMHVKq
Malware Config
Signatures
Files
-
51a700a8382c4802778fceb1067a59abaf3f05931b91700014397f17f8d569f9.exe windows x86
520318bd4b01f9cd1cd8b0d0e459d1c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoRegisterSurrogate
CoUninitialize
CoInitialize
CoRegisterClassObject
oleaut32
VariantTimeToDosDateTime
SafeArrayAllocData
SysFreeString
SafeArrayCreate
SafeArrayUnaccessData
SafeArrayGetLBound
DispGetParam
SysReAllocStringLen
SysStringLen
CreateStdDispatch
DosDateTimeToVariantTime
SysReAllocString
SafeArrayGetUBound
SysAllocString
SafeArrayPutElement
DispInvoke
SafeArrayDestroy
VariantCopyInd
SafeArrayCopy
VariantChangeType
DispGetIDsOfNames
SafeArrayLock
SysAllocStringLen
VariantClear
CreateDispTypeInfo
SafeArrayGetElemsize
VariantInit
kernel32
GetStartupInfoW
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LoadLibraryA
CloseHandle
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetStringTypeW
GetStringTypeA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetSystemTimeAsFileTime
GetCPInfo
SetSystemPowerState
GetLocalTime
LocalFree
GetLogicalDriveStringsW
MoveFileW
HeapFree
CreateFileW
LocalAlloc
CreateProcessW
SetTapeParameters
HeapAlloc
HeapValidate
HeapCompact
VirtualProtect
CreateEventW
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
GetProcessHeap
RtlUnwind
RaiseException
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ