Static task
static1
Behavioral task
behavioral1
Sample
a0d00a04e714eb469f9748fe45958b0195b7d907206f6ff4055439de6b3e45e8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a0d00a04e714eb469f9748fe45958b0195b7d907206f6ff4055439de6b3e45e8.exe
Resource
win10v2004-20220901-en
General
-
Target
a0d00a04e714eb469f9748fe45958b0195b7d907206f6ff4055439de6b3e45e8
-
Size
129KB
-
MD5
93515c441e56906132dda5d150d13003
-
SHA1
69f22df56e422c592e5dc17226e767b8c42cd5bf
-
SHA256
a0d00a04e714eb469f9748fe45958b0195b7d907206f6ff4055439de6b3e45e8
-
SHA512
6989e42973a7e236c4b196d464005edecd3765d2618f21752a30df4a32751530f43d99a7def72dbafedacea5b10aaad6a4dc277befe95b96469a8e4753a3daa4
-
SSDEEP
3072:xjvt6MBNJjWRkOtHxtt3EOL2QvIsitSYVsf51HTPl0/Oi:1ljpWRRZzqGYe1HTOR
Malware Config
Signatures
Files
-
a0d00a04e714eb469f9748fe45958b0195b7d907206f6ff4055439de6b3e45e8.exe windows x86
f7cfed33a1f0ae1ac1e275493ab6cfdb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
kernel32
LocalAlloc
GetLastError
FormatMessageW
GetCommandLineW
ExitProcess
lstrlenW
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleA
LocalFree
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
MultiByteToWideChar
Sleep
GetSystemDefaultLangID
CreateFileW
CloseHandle
MulDiv
LoadLibraryW
GetProcAddress
FreeLibrary
GetACP
HeapSetInformation
gdi32
GetLayout
ExtTextOutW
AddFontResourceExW
RemoveFontResourceExW
StartDocW
StartPage
EndPage
EndDoc
DeleteDC
DeleteObject
GetTextCharsetInfo
SelectObject
CreateFontIndirectW
TranslateCharsetInfo
CreateCompatibleDC
GetDeviceCaps
RemoveFontResourceW
GetFontData
GetFontResourceInfoW
AddFontResourceW
LineTo
MoveToEx
GetTextMetricsW
GetTextExtentPoint32W
SetBkMode
SetTextColor
SetTextAlign
user32
TranslateMessage
TranslateAcceleratorW
GetMessageW
LoadAcceleratorsW
MessageBoxW
GetDesktopWindow
SetCursor
GetSysColor
SetWindowTextW
SetRect
DispatchMessageW
InvalidateRect
DefWindowProcW
SendMessageW
BeginPaint
GetClientRect
GetSysColorBrush
EndPaint
SetWindowPos
DestroyWindow
PostQuitMessage
CharNextW
LoadStringW
DrawTextW
GetSystemMetrics
SystemParametersInfoW
CreateWindowExW
IsDlgButtonChecked
LoadIconW
RegisterClassW
ScrollWindowEx
SetScrollInfo
PostMessageW
MessageBeep
LoadCursorW
GetDlgItem
GetFocus
GetNextDlgTabItem
SetFocus
EnableWindow
FillRect
msvcrt
_vsnwprintf
memset
_ftol2_sse
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
comdlg32
PrintDlgW
shlwapi
ord158
PathRenameExtensionW
PathFindFileNameW
PathRemoveFileSpecW
PathAppendW
PathFindExtensionW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE