Static task
static1
Behavioral task
behavioral1
Sample
014aaf1a406acffd199e040efb32462ee67f1a1642980a99b0c6ef2191ec55fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
014aaf1a406acffd199e040efb32462ee67f1a1642980a99b0c6ef2191ec55fd.exe
Resource
win10v2004-20220812-en
General
-
Target
014aaf1a406acffd199e040efb32462ee67f1a1642980a99b0c6ef2191ec55fd
-
Size
157KB
-
MD5
0a70c61b99a9cdd77bceac3fd4a3065e
-
SHA1
4b4c19f02c65a36051f885fc5339b8c45c7da1b4
-
SHA256
014aaf1a406acffd199e040efb32462ee67f1a1642980a99b0c6ef2191ec55fd
-
SHA512
10e2c1374e747fd8ea651c05e54210574d8c00e6f2afe03fd9de4ab47ff7b4e8d8504bcdc59429c96c3f64e60a29acb6886f51399ccd5c0e57209a416a9b964e
-
SSDEEP
3072:QV+w4TY9ckCWTm/dqOiz6ppdYiYEfduevc6WZOnnJesL0KsLQp:Qp4cqkCWi/vw6jGyFuejIknJeuWLQp
Malware Config
Signatures
Files
-
014aaf1a406acffd199e040efb32462ee67f1a1642980a99b0c6ef2191ec55fd.exe windows x86
488eea61465f89198e617faeaafcf20f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
EnterCriticalSection
EnumResourceLanguagesA
ExitProcess
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
HeapAlloc
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
RemoveDirectoryA
RtlUnwind
SetLastError
SetUnhandledExceptionFilter
TlsGetValue
UnmapViewOfFile
lstrcmpA
lstrlenA
user32
MessageBoxA
MessageBoxIndirectA
EmptyClipboard
DefDlgProcA
advapi32
RegOpenKeyExA
RegLoadKeyA
RegEnumKeyA
ole32
CoUninitialize
OleInitialize
OleUninitialize
WriteFmtUserTypeStg
CoCreateGuid
CoCreateInstance
CoDisconnectObject
CoGetClassObject
CoInitialize
wininet
InternetSetFilePointer
InternetSetOptionExA
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetGetCookieA
InternetCrackUrlA
InternetConnectA
InternetCloseHandle
InternetCanonicalizeUrlA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetReadFile
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
Shell_NotifyIconA
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
ShellExecuteA
SHGetPathFromIDListA
SHBindToParent
Sections
.text Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ