Static task
static1
Behavioral task
behavioral1
Sample
410ca83398d6aaff30806a1c5c3df17bcbb6836b0d60e68df110856efb494f8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
410ca83398d6aaff30806a1c5c3df17bcbb6836b0d60e68df110856efb494f8a.exe
Resource
win10v2004-20220901-en
General
-
Target
410ca83398d6aaff30806a1c5c3df17bcbb6836b0d60e68df110856efb494f8a
-
Size
461KB
-
MD5
a06a905ce79760c3cdbdfe6d10bf8fd0
-
SHA1
dea56bfd99182d18c9c0d23459f3318e7e3afbea
-
SHA256
410ca83398d6aaff30806a1c5c3df17bcbb6836b0d60e68df110856efb494f8a
-
SHA512
d67a7693e4a9aaf33e5760bc6ea5b315813f54e9b3842f86d6f32688b506f9332fc3ace0eeeb0f7bf7872042c913107bd9392ef5780bf5178004aa304f2c8d2e
-
SSDEEP
6144:NDmEPiNRIesS/K6maE6qbmgyuCSvb5bRVDKnemdrjhttjqemzWSV0EnLegGJc:ZCNc2maKESvFL4em7jtMHVKq
Malware Config
Signatures
Files
-
410ca83398d6aaff30806a1c5c3df17bcbb6836b0d60e68df110856efb494f8a.exe windows x86
520318bd4b01f9cd1cd8b0d0e459d1c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoRegisterSurrogate
CoUninitialize
CoInitialize
CoRegisterClassObject
oleaut32
VariantTimeToDosDateTime
SafeArrayAllocData
SysFreeString
SafeArrayCreate
SafeArrayUnaccessData
SafeArrayGetLBound
DispGetParam
SysReAllocStringLen
SysStringLen
CreateStdDispatch
DosDateTimeToVariantTime
SysReAllocString
SafeArrayGetUBound
SysAllocString
SafeArrayPutElement
DispInvoke
SafeArrayDestroy
VariantCopyInd
SafeArrayCopy
VariantChangeType
DispGetIDsOfNames
SafeArrayLock
SysAllocStringLen
VariantClear
CreateDispTypeInfo
SafeArrayGetElemsize
VariantInit
kernel32
GetStartupInfoW
CreateFileA
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoW
LoadLibraryA
CloseHandle
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetStringTypeW
GetStringTypeA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetSystemTimeAsFileTime
GetCPInfo
SetSystemPowerState
GetLocalTime
LocalFree
GetLogicalDriveStringsW
MoveFileW
HeapFree
CreateFileW
LocalAlloc
CreateProcessW
SetTapeParameters
HeapAlloc
HeapValidate
HeapCompact
VirtualProtect
CreateEventW
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetVersionExA
GetProcessHeap
RtlUnwind
RaiseException
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
Sections
.text Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ