Static task
static1
Behavioral task
behavioral1
Sample
a5045e673477968f6146e7813ef7567d572045530baa0cb5d4d6fe5551a659da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5045e673477968f6146e7813ef7567d572045530baa0cb5d4d6fe5551a659da.exe
Resource
win10v2004-20220812-en
General
-
Target
a5045e673477968f6146e7813ef7567d572045530baa0cb5d4d6fe5551a659da
-
Size
192KB
-
MD5
217a6115ce17856bc153ffd9fcdd7ab0
-
SHA1
c2479c701b01878312e2050ac364c9273abc72a0
-
SHA256
a5045e673477968f6146e7813ef7567d572045530baa0cb5d4d6fe5551a659da
-
SHA512
cab362f7f2a78b1d82155952f0770739d19917cd00ba0abbb017ec89aee4ab1941a7ef6165647cfe30fae2c67f8f8223feac43d84aae5094ca586b9aec3ecdac
-
SSDEEP
3072:85OUh3XNUNjzmtlI+3KPNF3GCZi+u93p4uKNr9hoOVGToadTu:85O83XNUxrsIivCo/ToUa
Malware Config
Signatures
Files
-
a5045e673477968f6146e7813ef7567d572045530baa0cb5d4d6fe5551a659da.exe windows x86
56b532d990352eed2d2473aa1275604b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
QueryPerformanceCounter
SetConsoleCtrlHandler
FindClose
FindFirstFileA
FindNextFileA
OutputDebugStringA
OpenEventA
SetEvent
QueryPerformanceFrequency
CloseHandle
HeapFree
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
SetStdHandle
GetLastError
GetFileType
WriteFile
SetHandleCount
GetStdHandle
GetStartupInfoA
ReadFile
WideCharToMultiByte
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
HeapSize
FlushFileBuffers
CreateFileA
CompareStringA
MultiByteToWideChar
GetCPInfo
CompareStringW
GetACP
GetOEMCP
SetEnvironmentVariableA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEndOfFile
VirtualProtect
GetSystemInfo
LCMapStringA
LCMapStringW
GetTimeZoneInformation
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetFileAttributesA
GetFullPathNameA
GetCurrentDirectoryA
SetEnvironmentVariableW
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�$f Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE