Static task
static1
Behavioral task
behavioral1
Sample
a646defd206f8bc98f5e92454295e5b369194861b7cab5fe7bf37312e6803d80.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a646defd206f8bc98f5e92454295e5b369194861b7cab5fe7bf37312e6803d80.exe
Resource
win10v2004-20220901-en
General
-
Target
a646defd206f8bc98f5e92454295e5b369194861b7cab5fe7bf37312e6803d80
-
Size
48KB
-
MD5
469b3116d30b67f13930f0c0a695cb10
-
SHA1
ff3abe24e4537d9b52e9570dcfa3c33e88497233
-
SHA256
a646defd206f8bc98f5e92454295e5b369194861b7cab5fe7bf37312e6803d80
-
SHA512
36ec09eb014a52655776360da8245a52a35430b2fb1a10006ae93460a2768b78357fb1ba0ff18decbdaf888eb4d89c273a4cdc91641d13dc443156af33c784e7
-
SSDEEP
768:dDFxtZBQUKFHtKIuvjGd5ouOouEtTQIra5RQRS2mlfopep1/HlBxsPG8ri:dBZByFHtKIurGd5souEZtrUZeozxori
Malware Config
Signatures
Files
-
a646defd206f8bc98f5e92454295e5b369194861b7cab5fe7bf37312e6803d80.exe windows x86
49f08f03c4f352a4fcb5fbab1abb432d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsValidCodePage
GetVersionExW
GlobalSize
IsBadWritePtr
FindResourceW
CreateEventW
GetTempFileNameA
GetLocaleInfoW
LoadLibraryW
GetSystemDirectoryA
GlobalFindAtomA
OutputDebugStringW
EnterCriticalSection
MulDiv
GetCurrentThread
WideCharToMultiByte
LoadLibraryExW
GetPrivateProfileStringA
DeleteFileA
GetFileInformationByHandle
LeaveCriticalSection
ExpandEnvironmentStringsA
SetStdHandle
GetModuleHandleW
SetFileAttributesW
DeviceIoControl
GetTimeFormatW
GetEnvironmentVariableA
RemoveDirectoryA
ExpandEnvironmentStringsW
SetFilePointer
HeapCreate
GetCurrentDirectoryA
InitializeCriticalSection
GetTimeZoneInformation
TlsAlloc
GetTimeFormatA
user32
IsIconic
DestroyMenu
GetSystemMetrics
OpenClipboard
ReleaseCapture
PtInRect
CallWindowProcA
GetWindowPlacement
GetTopWindow
SetWindowsHookExW
SetWindowsHookExA
SetWindowPos
ole32
ReleaseStgMedium
OleUninitialize
CoInitialize
msvcrt
_adjust_fdiv
__CxxFrameHandler
__p__fmode
_wtoi
_onexit
__set_app_type
_lock
exit
__getmainargs
?what@exception@@UBEPBDXZ
__p__commode
wcschr
isdigit
_wcsicmp
malloc
gdi32
LineTo
GetObjectA
CreatePen
SetWindowOrgEx
SetTextColor
advapi32
CryptReleaseContext
RegDeleteKeyA
RevertToSelf
RegEnumValueA
FreeSid
AddAccessAllowedAce
RegisterEventSourceW
SetSecurityDescriptorDacl
version
GetFileVersionInfoW
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ