?MaudAlowhajjshodli@@YG_KUAsksDozydatoOustdudki@@IEH@Z
Static task
static1
Behavioral task
behavioral1
Sample
a497139f49bc023a71eb60eb37c8d88aa35a9948473907886b5e0d0317efea3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a497139f49bc023a71eb60eb37c8d88aa35a9948473907886b5e0d0317efea3e.exe
Resource
win10v2004-20221111-en
General
-
Target
a497139f49bc023a71eb60eb37c8d88aa35a9948473907886b5e0d0317efea3e
-
Size
180KB
-
MD5
5277402b036275c7d265cf3e8756ca80
-
SHA1
263e653a74ed58ff9a9077a68a18e4f294dd162e
-
SHA256
a497139f49bc023a71eb60eb37c8d88aa35a9948473907886b5e0d0317efea3e
-
SHA512
bbced59f7c0e4189861d3c67420d4fb1eafd68277f8a96f12f387333b6a262347868b22d2bfee0ca2735060310ea354848c9a3f5b1df5db2ef77269c3e3b0ba3
-
SSDEEP
3072:tCX4OiHNYLwgag1JePEqMH+miiFW/2ozPU0FRIZqXIzOlMpbAC3Vaj:I4OitOPTe8PXim0F4AxlkFaj
Malware Config
Signatures
Files
-
a497139f49bc023a71eb60eb37c8d88aa35a9948473907886b5e0d0317efea3e.exe windows x86
d0b88b01980673cd44976521910d9975
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionA
kernel32
GetConsoleAliasExesLengthW
GetVolumeInformationW
ExitProcess
GetLocaleInfoA
GetWindowsDirectoryA
GetPrivateProfileSectionW
FindClose
SetCurrentDirectoryW
HeapReAlloc
GetSystemDefaultLangID
GetCommandLineW
GetEnvironmentVariableW
GetDriveTypeW
GetSystemDefaultUILanguage
GetConsoleAliasExesLengthA
GetCurrentProcess
GlobalLock
GetUserDefaultLCID
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
CreateSemaphoreA
MulDiv
LocalReAlloc
CreateProcessA
IsValidLanguageGroup
IsDBCSLeadByte
GetEnvironmentVariableA
GetConsoleOutputCP
GetStdHandle
GetLogicalDriveStringsA
IsDBCSLeadByteEx
SetLastError
GetThreadLocale
IsValidCodePage
SetFileApisToOEM
CreateSemaphoreW
GetOEMCP
GetModuleHandleA
FindNextFileW
GetCurrentThreadId
GetDiskFreeSpaceExW
GetVersion
GetCurrentProcessId
user32
DrawFrameControl
DdeConnect
AdjustWindowRectEx
CreateIconFromResource
GetClassLongW
GetClassInfoExA
GetUpdateRgn
SwitchToThisWindow
DefMDIChildProcW
DdeKeepStringHandle
FlashWindow
SetScrollPos
GetWindowThreadProcessId
GetMessageTime
InSendMessage
GetScrollPos
DestroyIcon
SetWindowTextW
FindWindowA
OpenClipboard
GetKeyNameTextW
GetKeyboardType
ClipCursor
IsWindow
SetThreadDesktop
IsCharLowerW
CreatePopupMenu
SetMenu
EnumChildWindows
GetMenuStringA
GetDesktopWindow
DdeCmpStringHandles
GetDlgItem
GetMenuState
GetClipboardData
GetWindowLongA
CharLowerA
SetCursorPos
DdeUninitialize
MapVirtualKeyA
GetAsyncKeyState
SetLastErrorEx
GetDC
IsCharUpperW
ShowCaret
SetFocus
FindWindowW
CharLowerBuffW
IsCharAlphaW
CharPrevW
DefFrameProcA
EnumDisplaySettingsA
CharUpperA
GetProcessWindowStation
DdeQueryNextServer
GetParent
LoadBitmapA
GetSubMenu
GetKeyState
SetCapture
GetTopWindow
DdeGetLastError
ImpersonateDdeClientWindow
SetActiveWindow
MapVirtualKeyW
VkKeyScanW
GetClassNameA
CloseClipboard
GetWindowTextLengthW
CopyAcceleratorTableW
Exports
Exports
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ