Static task
static1
Behavioral task
behavioral1
Sample
a12ee28841fb8ba81df57ca42626685d529dc87ba7ea68d6927ccea74f051b19.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a12ee28841fb8ba81df57ca42626685d529dc87ba7ea68d6927ccea74f051b19.exe
Resource
win10v2004-20220901-en
General
-
Target
a12ee28841fb8ba81df57ca42626685d529dc87ba7ea68d6927ccea74f051b19
-
Size
172KB
-
MD5
93dfc94fcc0e0ae42e54f70632111220
-
SHA1
84ff21bc7e2d7d63c5c4fb65a25311ed3e766a44
-
SHA256
a12ee28841fb8ba81df57ca42626685d529dc87ba7ea68d6927ccea74f051b19
-
SHA512
2617c715cada66bdbdadbb3314e04dbeb48b661aa28d549e6ad66a2b3bdef898e9e0315a660a2d40288f67642367ad511f620995855c81a2d8383ce9ba3c53e5
-
SSDEEP
3072:4DXtEPmgFzyTxD2R53mK1oXdgVXscSDADeak7dJHB/AK:4CPmYc2PhEgV8cSsQLH5AK
Malware Config
Signatures
Files
-
a12ee28841fb8ba81df57ca42626685d529dc87ba7ea68d6927ccea74f051b19.exe windows x86
e6d96fab8010cc2ab678948b120a1a33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
CreateProcessA
ReadFile
CreatePipe
MultiByteToWideChar
WideCharToMultiByte
GlobalAlloc
GetModuleHandleA
GetProcAddress
FreeLibrary
FindFirstFileA
FindClose
DeleteFileA
GetThreadLocale
GetModuleFileNameA
LoadLibraryA
CreateDirectoryA
GetWindowsDirectoryA
SetHandleInformation
MoveFileA
GetLastError
GetOEMCP
GetACP
CompareStringA
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileAttributesA
SetFilePointer
SetEndOfFile
SetStdHandle
GetStdHandle
SetHandleCount
WriteFile
GetStringTypeW
GetStringTypeA
VirtualFree
HeapReAlloc
HeapDestroy
GetTimeZoneInformation
GetCurrentDirectoryA
GetFullPathNameA
GetExitCodeProcess
SetEnvironmentVariableW
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
LCMapStringW
LCMapStringA
FlushFileBuffers
SetEnvironmentVariableA
GetVersion
HeapCreate
CompareStringW
HeapFree
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
VirtualAlloc
GetFileType
CreateFileA
RtlUnwind
GetStartupInfoA
GetCommandLineA
user32
GetMessageA
MessageBoxA
wsprintfA
ReleaseDC
GetDC
SetWindowPos
GetClientRect
GetDesktopWindow
EndPaint
BeginPaint
PostQuitMessage
DefWindowProcA
DispatchMessageA
LoadCursorA
RegisterClassA
CreateWindowExA
SetTimer
TranslateMessage
gdi32
CreateDIBSection
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueExA
RegEnumKeyExA
RegOpenKeyExA
wsock32
htons
WSAAsyncSelect
closesocket
WSAStartup
WSAGetLastError
send
connect
ioctlsocket
socket
bind
listen
ntohs
accept
recv
getsockname
Sections
.text Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE