Static task
static1
Behavioral task
behavioral1
Sample
1392ae2bf5c47a852358373009ae01757efa2225009a1954799b4e31c47a27f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1392ae2bf5c47a852358373009ae01757efa2225009a1954799b4e31c47a27f5.exe
Resource
win10v2004-20220812-en
General
-
Target
1392ae2bf5c47a852358373009ae01757efa2225009a1954799b4e31c47a27f5
-
Size
191KB
-
MD5
0cd0ba7c7b6ea66c3d3152814caea7be
-
SHA1
a5f92f2bd446c174e7dfc86db196916872d384de
-
SHA256
1392ae2bf5c47a852358373009ae01757efa2225009a1954799b4e31c47a27f5
-
SHA512
a30e7d990e4094d08dc57cf4338bd0939a80097bfdc3b415b8057a539a6868b9129c547b16967439c44e506987b4bf6dea13ca8bbc56bc7a8cfb4a1bbf6e43ce
-
SSDEEP
3072:CKR/N5rDQxtDQDThml+y730yRskJW8rkzL8/Dt5XNc2yFpjUWMS72UohB:1R/IswUy730SJWv8/J7sHFSB
Malware Config
Signatures
Files
-
1392ae2bf5c47a852358373009ae01757efa2225009a1954799b4e31c47a27f5.exe windows x86
52d9cbb6dbcc5623f0aa3867c1500bad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFileEx
QueueUserWorkItem
GetModuleHandleA
GetLocaleInfoA
LoadLibraryA
GetProcAddress
LCMapStringA
RaiseException
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
MultiByteToWideChar
LCMapStringW
user32
EndPaint
DispatchMessageA
HiliteMenuItem
GetThreadDesktop
ShowOwnedPopups
CloseClipboard
GetGUIThreadInfo
SetMenuInfo
DispatchMessageW
MessageBoxIndirectW
ReuseDDElParam
GetDlgItem
GetClassInfoA
SetCapture
AttachThreadInput
GetListBoxInfo
OemToCharW
IsWindow
UnhookWindowsHook
ClientToScreen
EnumWindows
SetUserObjectInformationA
GetInputDesktop
oleaut32
UnRegisterTypeLi
DispCallFunc
VarBstrFromDisp
VarDiv
SafeArrayAccessData
VarBstrCat
VarCat
GetAltMonthNames
SafeArrayRedim
DosDateTimeToVariantTime
SafeArraySetRecordInfo
VarAnd
BSTR_UserMarshal
LoadTypeLi
VarFormatFromTokens
VarEqv
Sections
.text Size: 182KB - Virtual size: 182KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ