Static task
static1
Behavioral task
behavioral1
Sample
a111451e310d250e07172f10c66ce13898ed8dbd6b2a6a22d77143917731149f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a111451e310d250e07172f10c66ce13898ed8dbd6b2a6a22d77143917731149f.exe
Resource
win10v2004-20220901-en
General
-
Target
a111451e310d250e07172f10c66ce13898ed8dbd6b2a6a22d77143917731149f
-
Size
111KB
-
MD5
0c4be357ff16abe832adf73eb69152e6
-
SHA1
2f13ad04b138a4a12491647dfa1eed8349bbdaea
-
SHA256
a111451e310d250e07172f10c66ce13898ed8dbd6b2a6a22d77143917731149f
-
SHA512
35cd04f1923b08c4d797dc45be0e3bc295159beacfc67bdb8477d59e873781ec59556351454eb058f179a48d9947093ff3dd60e58f54cd0fa19fea93033743fb
-
SSDEEP
3072:vUYev3SXkKJxejgEPA6I3Fsp6Pr1fvIKEdTzuhOChC38usHfJY6En6T2TSCOCOdB:sYevKjvEPA6I3Fsp6Pr1fvIKEdTzuhO+
Malware Config
Signatures
Files
-
a111451e310d250e07172f10c66ce13898ed8dbd6b2a6a22d77143917731149f.exe windows x86
cbf208d7651aba8f2686d25b59b0c97c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegCreateKeyA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetAtomNameA
GetCommandLineA
GetCurrentProcessId
GetDiskFreeSpaceExA
GetDriveTypeA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetSystemTime
GetTickCount
GetVersionExA
GetWindowsDirectoryA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
MapViewOfFile
OpenProcess
Process32First
Process32Next
ReleaseSemaphore
SetErrorMode
SetFileAttributesA
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
WaitForSingleObject
WritePrivateProfileStringA
lstrlenA
msvcrt
_strlwr
_strupr
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
fclose
fflush
fopen
fprintf
fputs
free
malloc
memcpy
memset
rand
signal
sprintf
srand
strcat
strcmp
strcpy
strstr
user32
EnumWindows
GetWindowTextA
GetWindowThreadProcessId
MessageBoxA
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE