Static task
static1
Behavioral task
behavioral1
Sample
ada540fb92b3b5adff1664f271a5b4d119916244d92b7d925a13ec2592106dbf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ada540fb92b3b5adff1664f271a5b4d119916244d92b7d925a13ec2592106dbf.exe
Resource
win10v2004-20220901-en
General
-
Target
ada540fb92b3b5adff1664f271a5b4d119916244d92b7d925a13ec2592106dbf
-
Size
120KB
-
MD5
09df047daff0e9de55339f2c3b1c81a0
-
SHA1
0e65b71fe2eb315b09c25cd2a75be7183ac8db1a
-
SHA256
ada540fb92b3b5adff1664f271a5b4d119916244d92b7d925a13ec2592106dbf
-
SHA512
103245ee858bded42cff66d4034adfda643895bdfc4a795559076b98cd7065d003b3246e3ca3b94cde1180b99c234a560600fe42132b0b3174113ea78b559608
-
SSDEEP
3072:pNVJxjtL3OJ5HcAbGfx1rSDADeak7dJHB/Aq:P1ZrOJd7GrSsQLH5Aq
Malware Config
Signatures
Files
-
ada540fb92b3b5adff1664f271a5b4d119916244d92b7d925a13ec2592106dbf.exe windows x86
a1a3ecfb87ba762b6f3034b634b6dd0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
lstrlenW
WideCharToMultiByte
CreateToolhelp32Snapshot
CloseHandle
CreateFileW
LoadLibraryW
Module32FirstW
SetUnhandledExceptionFilter
GetCurrentProcessId
GetProcAddress
GetCommandLineW
GetPrivateProfileStringW
GetPrivateProfileIntW
GetCurrentThreadId
GetCurrentProcess
Module32NextW
OutputDebugStringW
GetModuleFileNameW
WaitForSingleObject
TerminateProcess
Sleep
OpenProcess
CreateMutexW
GetLastError
WritePrivateProfileStringW
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetSystemTimeAsFileTime
GetTickCount
IsDebuggerPresent
QueryPerformanceCounter
UnhandledExceptionFilter
user32
SetWindowLongW
CreateWindowExW
PeekMessageW
DispatchMessageW
TranslateMessage
IsWindow
ShowWindow
DefWindowProcW
FindWindowW
FindWindowExW
SendMessageW
shell32
ShellExecuteW
CommandLineToArgvW
msvcr80
wcscpy_s
swprintf_s
srand
_vscwprintf
memcpy_s
_invalid_parameter_noinfo
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
_wtoi
??2@YAPAXI@Z
vswprintf_s
?terminate@@YAXXZ
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
_snwprintf_s
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
wcsrchr
wprintf
wcscat_s
??_U@YAPAXI@Z
wcschr
_wsplitpath_s
_vsnwprintf_s
_wtoi64
_mkdir
exit
??3@YAXPAX@Z
_time64
rand
memset
__CxxFrameHandler3
_CxxThrowException
wcsncpy_s
memcpy
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
dbghelp
MiniDumpWriteDump
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ