Static task
static1
Behavioral task
behavioral1
Sample
03a702d4ace540c06f5f90d9bc57c642b77f1a0c8d907d593152bf0902cd6458.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
03a702d4ace540c06f5f90d9bc57c642b77f1a0c8d907d593152bf0902cd6458.exe
Resource
win10v2004-20220812-en
General
-
Target
03a702d4ace540c06f5f90d9bc57c642b77f1a0c8d907d593152bf0902cd6458
-
Size
109KB
-
MD5
a1a8ac6cd7af52ac774775b10b5b7390
-
SHA1
5fcc66d7f69f977ad4668e37c0162c75f627fd00
-
SHA256
03a702d4ace540c06f5f90d9bc57c642b77f1a0c8d907d593152bf0902cd6458
-
SHA512
7586414c02f313491a76ee0072d624851f7e747e22d67d16e950627cc04c442a0b4cd34ec8e480a9f6f0f9a2c65224b90d5311adcb7cb89f7533278bb95285c8
-
SSDEEP
1536:QbQtTquyqPiHFP2dNfTfFcEqU5t6Jt5TbZjFR50whQ9G11IyE2W6OGJD:9TPaHZsfTkuAJt5T1H50x+GpzG
Malware Config
Signatures
Files
-
03a702d4ace540c06f5f90d9bc57c642b77f1a0c8d907d593152bf0902cd6458.exe windows x86
10c6a04bc0245f8267be367939d30ba9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
SetFilePointer
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
VirtualProtect
GetSystemInfo
GetLocaleInfoA
FlushFileBuffers
InterlockedIncrement
WaitForMultipleObjects
GetLastError
GetModuleHandleA
ResetEvent
HeapFree
GetProcessHeap
CreateEventW
GetStdHandle
CloseHandle
GetWindowsDirectoryA
CreateFileA
lstrcatA
user32
TranslateMessage
GetMessageW
LoadImageW
GetDC
ReleaseDC
MessageBoxW
SetWindowTextW
ShowWindow
SetDlgItemTextW
SetFocus
SendMessageW
PostThreadMessageW
GetDlgItemTextW
GetDlgItem
GetWindowTextLengthW
EnableWindow
GetWindowLongW
SetWindowLongW
SendDlgItemMessageW
GetParent
PostMessageW
LoadStringW
KillTimer
DispatchMessageW
SetTimer
PostQuitMessage
LoadCursorW
LoadIconA
LoadCursorA
RegisterClassExA
CreateWindowExA
UpdateWindow
GetMessageA
DispatchMessageA
BeginPaint
EndPaint
DefWindowProcA
GetSysColor
gdi32
GetObjectW
GetDeviceCaps
CreateFontIndirectW
DeleteObject
GetStockObject
Rectangle
MoveToEx
LineTo
Ellipse
RoundRect
comdlg32
GetOpenFileNameW
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetFolderPathW
SHBindToParent
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
SHSetLocalizedName
ole32
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoRegisterClassObject
CoRevokeClassObject
CoInitializeEx
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoUninitialize
shlwapi
StrFormatByteSizeW
StrRetToBufW
SHSetValueW
PathFindFileNameW
PathAddExtensionW
PathAppendW
PathRemoveFileSpecW
StrStrIA
PathCombineW
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ