Static task
static1
Behavioral task
behavioral1
Sample
a0b6212e473e223acc8b01a464ffca80444fa9c15156882cd88497c54fc626f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0b6212e473e223acc8b01a464ffca80444fa9c15156882cd88497c54fc626f9.exe
Resource
win10v2004-20220901-en
General
-
Target
a0b6212e473e223acc8b01a464ffca80444fa9c15156882cd88497c54fc626f9
-
Size
281KB
-
MD5
939025da8fa7682f3c85f7077b5ef8b0
-
SHA1
197f0732ac899fed0bb1cfc2ff8e77e946125612
-
SHA256
a0b6212e473e223acc8b01a464ffca80444fa9c15156882cd88497c54fc626f9
-
SHA512
06dd98ccdbd7fbd5046bb63bdc265f56d98de6e3b8d6b6b147154c6c7c2687e2f5179560bf5d0f4aa19cd2f66bd7e7f56591ae9ecfaeff26555729385192cebd
-
SSDEEP
6144:KsXeMUkYZkDX+ii/JvvD3b+e3tWnOahz7ms48BhvCR:pOzksk74Bv7rdOFM8E
Malware Config
Signatures
Files
-
a0b6212e473e223acc8b01a464ffca80444fa9c15156882cd88497c54fc626f9.exe windows x86
3ee5246d7cbc661af1605bd3be59623b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI1FromBool
VarCyRound
VarMonthName
VarCyFromI1
VarBoolFromI1
DispInvoke
VarDecFromDate
SafeArrayDestroyDescriptor
VarDateFromR4
VarCyFromI2
VarUI1FromStr
VarDecCmpR8
VarBstrFromI4
VarBoolFromR4
SafeArrayCopy
VarI2FromR4
VarI1FromCy
LPSAFEARRAY_UserFree
GetActiveObject
VarI4FromDate
user32
DrawIconEx
DlgDirSelectComboBoxExW
GetPriorityClipboardFormat
GetUserObjectInformationA
CheckRadioButton
GetWindowModuleFileNameW
SetDoubleClickTime
DdeSetQualityOfService
OpenWindowStationW
PeekMessageW
OpenInputDesktop
FlashWindow
DestroyWindow
GrayStringW
MsgWaitForMultipleObjects
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
__getmainargs
_exit
_XcptFilter
exit
_except_handler3
__p__commode
_controlfp
__dllonexit
_onexit
_acmdln
ole32
OleCreateLinkToFile
HBITMAP_UserUnmarshal
CLIPFORMAT_UserMarshal
CoFileTimeNow
ReadFmtUserTypeStg
OleCreateLinkFromData
OleCreateFromData
STGMEDIUM_UserUnmarshal
GetConvertStg
CreateDataCache
CoLockObjectExternal
HWND_UserFree
CoTaskMemFree
HBITMAP_UserFree
gdi32
CopyMetaFileW
Pie
CreateICA
OffsetWindowOrgEx
CreateEllipticRgn
ExtCreateRegion
GetCharWidthFloatW
SaveDC
DeleteEnhMetaFile
TextOutW
GetTextCharsetInfo
kernel32
ExitProcess
GetModuleHandleA
GetStartupInfoA
shell32
SHBrowseForFolderA
SHQueryRecycleBinW
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
SHGetSpecialFolderPathA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ