Static task
static1
Behavioral task
behavioral1
Sample
a7d12c5c94327035e79f411ec3bb60bb6411784368dd75eddb4e54e6f83d29a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7d12c5c94327035e79f411ec3bb60bb6411784368dd75eddb4e54e6f83d29a6.exe
Resource
win10v2004-20220901-en
General
-
Target
a7d12c5c94327035e79f411ec3bb60bb6411784368dd75eddb4e54e6f83d29a6
-
Size
713KB
-
MD5
0a2628ce2c0c9934d3488daf36e4f2dd
-
SHA1
2d0a88f4b9add2f0e95ef2aef8ba09b1b3faf8d2
-
SHA256
a7d12c5c94327035e79f411ec3bb60bb6411784368dd75eddb4e54e6f83d29a6
-
SHA512
1d2f75d0fc1e012bcf17a9e9b1b61e8b7fccbb80a550873ca79a0a9b2eeaaca8d64b1b6787f7f4ed95d36dac2952a177749734ad5e44683fd73c1c0a0a9386d8
-
SSDEEP
12288:5BJIvKnDMDsGuCXvWzx+xKophHuHdrSMG9vonS+ELvIBouUS:BIvKnosCvWNSzHu9rFYgn9MgBouUS
Malware Config
Signatures
Files
-
a7d12c5c94327035e79f411ec3bb60bb6411784368dd75eddb4e54e6f83d29a6.exe windows x86
6b9bf5b4530024d20aff4c9a73f17946
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToFileTime
SetLastError
GetTimeZoneInformation
GetLocalTime
GetVersion
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
SetEvent
WaitForSingleObject
ReleaseMutex
UnmapViewOfFile
WaitForMultipleObjects
CreateEventA
OpenEventA
CreateMutexA
OpenMutexA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
WriteFile
SetFilePointer
CreateFileW
CreateFileA
GetCurrentThreadId
GetCurrentProcessId
GetProcessAffinityMask
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryA
SetConsoleCtrlHandler
OpenProcess
Sleep
TerminateProcess
CreateDirectoryA
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FormatMessageA
GetFileAttributesA
GetFileType
GetStdHandle
QueryPerformanceCounter
GlobalMemoryStatus
GetVersionExA
RaiseException
RtlUnwind
GetFileAttributesW
ExitProcess
HeapAlloc
HeapFree
HeapReAlloc
CreateDirectoryW
DeleteFileW
RemoveDirectoryW
DeleteFileA
HeapDestroy
HeapCreate
VirtualFree
ExitThread
CreateThread
GetCommandLineA
GetProcessHeap
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetHandleCount
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
ReadFile
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
HeapSize
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FlushFileBuffers
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
MoveFileA
CopyFileA
CopyFileW
GetLastError
FindFirstFileA
FindFirstFileW
FileTimeToSystemTime
FindNextFileA
FindNextFileW
FindClose
GetModuleHandleA
GetTickCount
RemoveDirectoryA
user32
GetProcessWindowStation
GetUserObjectInformationW
GetDesktopWindow
MessageBoxA
advapi32
DeregisterEventSource
ReportEventA
RegisterEventSourceA
Sections
.text Size: 424KB - Virtual size: 422KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 48KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE