Static task
static1
Behavioral task
behavioral1
Sample
53eaeb146878f09b7e298e6e553aed6347541a789a829d8c747d45c7cfae0290.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53eaeb146878f09b7e298e6e553aed6347541a789a829d8c747d45c7cfae0290.exe
Resource
win10v2004-20220812-en
General
-
Target
53eaeb146878f09b7e298e6e553aed6347541a789a829d8c747d45c7cfae0290
-
Size
342KB
-
MD5
0ac222aa60edcfe4471d264c195924e0
-
SHA1
07e65b03d0967d7eed2f1f8a0d36eff43e1228db
-
SHA256
53eaeb146878f09b7e298e6e553aed6347541a789a829d8c747d45c7cfae0290
-
SHA512
8fc588949c996f7729cf80ca4a6a9be5ff16804a2bc1cd3cea1b8e72142a8f195e423a82a9539ec9735f529fca52db5056be1fdef87feb84a04855491193676d
-
SSDEEP
6144:pfwX9zNTlWkP1GHxFGl537gw/eJPRWSUcbo9ucAOQToClUKhNiaC1Vw:FwtzNTlWktGHTGfgWS8QcUYCc
Malware Config
Signatures
Files
-
53eaeb146878f09b7e298e6e553aed6347541a789a829d8c747d45c7cfae0290.exe windows x86
ee46a835888894a3b0850e9c19d7c19a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
SetStdHandle
IsProcessorFeaturePresent
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
IsValidCodePage
LCMapStringW
GetOEMCP
GetACP
HeapFree
HeapQueryInformation
HeapReAlloc
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
ExitProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStringTypeW
CreateFileW
GetModuleHandleA
LoadLibraryA
HeapSize
GetProcAddress
GetLastError
MulDiv
HeapCreate
LoadLibraryW
GetEnvironmentStrings
GetProcessHeap
HeapAlloc
GetCPInfo
GetTickCount
QueryPerformanceCounter
CloseHandle
SetFilePointer
DeleteCriticalSection
GetFileType
GetStdHandle
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapValidate
IsBadReadPtr
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
GetCurrentThreadId
TlsFree
GetModuleHandleW
InterlockedIncrement
SetLastError
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
RtlUnwind
MultiByteToWideChar
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetHandleCount
RaiseException
user32
UpdateWindow
LoadCursorA
RegisterClassA
EndPaint
DestroyWindow
GetMessageA
SetTimer
PostQuitMessage
KillTimer
GetParent
LoadMenuA
GetClientRect
SendMessageA
BeginPaint
EnumWindows
GetDC
InvalidateRect
CreateWindowExA
ReleaseDC
GetDlgItem
DefWindowProcA
LoadAcceleratorsA
ShowWindow
GetSysColorBrush
IsWindow
DispatchMessageA
SendMessageW
gdi32
MoveToEx
SelectClipPath
AnimatePalette
GetTextExtentPoint32A
LineTo
CreateFontA
CreatePalette
SetBkMode
DeleteObject
SelectObject
DPtoLP
Rectangle
Ellipse
EndPath
RealizePalette
SelectPalette
CreatePen
CreateSolidBrush
TextOutA
BeginPath
oleaut32
VariantInit
VariantClear
ws2_32
inet_addr
gdiplus
GdiplusStartup
Sections
.text Size: 270KB - Virtual size: 269KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ