Static task
static1
Behavioral task
behavioral1
Sample
a0e0cd03a040ce8287cf3df3236790942a5ff7e8d1b24f83bea2a609c545dbd9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a0e0cd03a040ce8287cf3df3236790942a5ff7e8d1b24f83bea2a609c545dbd9.exe
Resource
win10v2004-20221111-en
General
-
Target
a0e0cd03a040ce8287cf3df3236790942a5ff7e8d1b24f83bea2a609c545dbd9
-
Size
299KB
-
MD5
b94bcdd0d7218ef1777b0b2fb9344312
-
SHA1
c19a012ececb267d50479a7daacfc470320ce155
-
SHA256
a0e0cd03a040ce8287cf3df3236790942a5ff7e8d1b24f83bea2a609c545dbd9
-
SHA512
648f9f9c256be30279c0d8c27c5a53f95abd6df5650588432303907441cb7bc84f900b9899a32438195d81c30060c17dac340e9453ceb695024798ec362dc747
-
SSDEEP
1536:mikokUqm1rbGOc4eu22Jcwb+TjyuXhuEXOIV1ol675XG+dkqlun:acc4eu22Kwb+/yuxRXOIV+2XGn
Malware Config
Signatures
Files
-
a0e0cd03a040ce8287cf3df3236790942a5ff7e8d1b24f83bea2a609c545dbd9.exe windows x86
bda97b8bda55e43cebd987b717c84fa2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteW
ShellExecuteA
ole32
StringFromGUID2
CoCreateGuid
crypt32
CryptDecodeObject
CertGetNameStringW
CertFindCertificateInStore
CertCloseStore
CryptMsgClose
CryptMsgGetParam
CertFreeCertificateContext
CryptQueryObject
kernel32
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GlobalAddAtomA
SetEnvironmentVariableA
GetFileType
GetFileSize
RaiseException
RtlUnwind
UnhandledExceptionFilter
ExitThread
ExitProcess
GetCommandLineA
GetStartupInfoA
LoadLibraryExA
lstrcpynA
lstrlenA
VirtualFree
Sleep
LocalAlloc
TlsGetValue
TlsSetValue
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
EnterCriticalSection
EnumCalendarInfoA
FindClose
FindFirstFileA
FindFirstFileW
FindResourceA
FormatMessageA
FormatMessageW
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineW
GetComputerNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetStdHandle
GetStringTypeExA
GetStringTypeExW
GetTempPathA
GetTempPathW
GetThreadLocale
GetTickCount
GetUserDefaultLangID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalGetAtomNameA
GlobalLock
GlobalUnlock
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFree
LockResource
MulDiv
MultiByteToWideChar
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetThreadLocale
SizeofResource
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
lstrcmpA
lstrcpyA
lstrlenW
WaitForMultipleObjects
SetThreadContext
SetThreadExecutionState
GetEnvironmentStringsW
HeapAlloc
MoveFileW
GetLogicalDrives
GetTimeFormatA
GetSystemTimeAsFileTime
OutputDebugStringA
InterlockedIncrement
InterlockedDecrement
GetOEMCP
GetModuleHandleW
TlsAlloc
TlsFree
HeapFree
GetTimeZoneInformation
TerminateProcess
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
QueryPerformanceCounter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapReAlloc
GetSystemInfo
GetConsoleCP
GetConsoleMode
FlushFileBuffers
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 209KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ