Static task
static1
Behavioral task
behavioral1
Sample
45a5caad347bbf11d6d361636d66e954300e6890d2ac5d3f393ffd6464148444.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45a5caad347bbf11d6d361636d66e954300e6890d2ac5d3f393ffd6464148444.exe
Resource
win10v2004-20220812-en
General
-
Target
45a5caad347bbf11d6d361636d66e954300e6890d2ac5d3f393ffd6464148444
-
Size
500KB
-
MD5
0acf8285917ecc4ffda06fac7e77774c
-
SHA1
aa5e8ffc52667c285a37eacc5bda5d751cb88c3b
-
SHA256
45a5caad347bbf11d6d361636d66e954300e6890d2ac5d3f393ffd6464148444
-
SHA512
6e2d2cf51a0731b36250bed698056293f68b7c3dfcb393233064a75e4f57037e08f956f1efb69ae831267f1864cf54b129a02ccd15f2d2732493719fd18439b4
-
SSDEEP
6144:33OBipi9ud6bX7Ma1TBJ9UjdyctYrT7/PsW8EZd40seWs9Zxip6:yR/Ma1Tr9IbtYLPsfEHlWs9ap6
Malware Config
Signatures
Files
-
45a5caad347bbf11d6d361636d66e954300e6890d2ac5d3f393ffd6464148444.exe windows x86
188406a1cc685802b2263a636ba0f4cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
kernel32
MapViewOfFileEx
GetLastError
CreateFileMappingA
UnmapViewOfFile
SetFilePointer
GetFileSize
CreateFileA
GetFileAttributesA
ReadFile
WriteFile
SizeofResource
LockResource
LoadResource
FindResourceA
GetFileSizeEx
FlushFileBuffers
FindClose
DeleteFileA
RemoveDirectoryA
FindNextFileA
FindFirstFileA
SetFileTime
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetModuleFileNameA
GetFileTime
GetVersion
GetVersionExA
FreeLibrary
OutputDebugStringA
GetProcAddress
LoadLibraryA
GetSystemDefaultLangID
GetSystemDirectoryA
GetWindowsDirectoryA
SetCurrentDirectoryA
GetCommandLineA
Sleep
CreateThread
CreateDirectoryA
GetTempFileNameA
GetTickCount
CompareStringW
CompareStringA
SetEndOfFile
CreateFileW
GetTimeZoneInformation
GetLocaleInfoW
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
CloseHandle
GetCurrentThreadId
InitializeCriticalSection
GetTempPathA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
GetStringTypeA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
MoveFileA
GetModuleHandleA
ExitProcess
HeapAlloc
GetProcessHeap
GetStartupInfoA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapDestroy
HeapCreate
VirtualFree
FatalAppExitA
VirtualAlloc
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThread
SetHandleCount
GetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
HeapSize
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
SetEnvironmentVariableA
user32
SendMessageA
GetDlgItem
EnableWindow
LoadStringA
MessageBoxA
SendDlgItemMessageA
SetDlgItemTextA
CreateDialogParamA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
IsWindow
advapi32
AllocateAndInitializeSid
RegQueryValueExA
RegOpenKeyExA
CheckTokenMembership
FreeSid
RegCloseKey
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE