Static task
static1
Behavioral task
behavioral1
Sample
ad4631b8e4386e1de9b6586df6086f90a352f5342694e3fa5b58056d867f61ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad4631b8e4386e1de9b6586df6086f90a352f5342694e3fa5b58056d867f61ec.exe
Resource
win10v2004-20220812-en
General
-
Target
ad4631b8e4386e1de9b6586df6086f90a352f5342694e3fa5b58056d867f61ec
-
Size
737KB
-
MD5
91dc95811cd745f6b50312b60b5cad82
-
SHA1
45e67563f399544a448d1a34960d150c723f38a4
-
SHA256
ad4631b8e4386e1de9b6586df6086f90a352f5342694e3fa5b58056d867f61ec
-
SHA512
6bfdf4364cab7cad3dfbb46507a0ac881763981c82e6464fafa52478048062546ebb95001f5c9a85fe58418ff50f293b4857e7fe48b0a7437f8de83fcca57473
-
SSDEEP
12288:jZE05Qicx8Jlg2qAkw5fEpR4fkmbC1IdykajiV7itMx3L78zCUchecNt0VQ:jjYx8JlT55JXb9dyT+V7itMxsz+heTVQ
Malware Config
Signatures
Files
-
ad4631b8e4386e1de9b6586df6086f90a352f5342694e3fa5b58056d867f61ec.exe windows x86
08dab69a853b69ebbfb3b36c01f5602b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
BitBlt
CreateCompatibleDC
kernel32
GetVersion
GetCurrentThreadId
GetCurrentThread
GetModuleHandleA
GetLastError
GetCurrentProcessId
GetTickCount
GetCommandLineA
ExitProcess
VirtualAlloc
GetOEMCP
Sleep
VirtualFree
HeapCreate
SizeofResource
GetModuleHandleW
GetACP
lstrcpynA
CloseHandle
ReadFile
SetFilePointer
TlsFree
RaiseException
HeapSize
WideCharToMultiByte
LockResource
GetEnvironmentStrings
GetEnvironmentStringsW
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
LCMapStringW
LeaveCriticalSection
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
WaitForMultipleObjects
FindFirstFileW
ResetEvent
GetProcessHeap
GetProcAddress
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
VirtualProtect
TlsAlloc
QueryPerformanceCounter
SetEvent
GetVersionExW
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
InterlockedIncrement
GetLocaleInfoA
SetEndOfFile
TerminateProcess
SetEnvironmentVariableA
CreateThread
CreateMutexA
GetLocalTime
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
FormatMessageW
LocalFree
FreeLibrary
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
LoadLibraryW
GetCPInfo
GetTempPathA
SetStdHandle
FreeEnvironmentStringsW
LocalAlloc
GetCurrentDirectoryA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
FindNextFileA
WaitForSingleObject
GetFileAttributesA
GetConsoleOutputCP
GetStdHandle
user32
SetCursor
CallWindowProcA
InvalidateRect
GetSysColor
SetDlgItemTextA
GetFocus
GetDesktopWindow
LoadIconA
ScreenToClient
GetDlgItem
SetWindowTextA
EndDialog
SetWindowLongA
GetWindowRect
GetSystemMetrics
FillRect
CreateWindowExA
GetWindowLongA
IsIconic
LoadStringA
GetWindow
ShowWindow
UpdateWindow
GetParent
DestroyWindow
ClientToScreen
TranslateMessage
UnregisterClassA
GetDC
EndPaint
DispatchMessageA
SetWindowPos
PostQuitMessage
MoveWindow
Sections
.text Size: 693KB - Virtual size: 1019KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ