Static task
static1
Behavioral task
behavioral1
Sample
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe
Resource
win10v2004-20221111-en
General
-
Target
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4
-
Size
137KB
-
MD5
2a95c5a6b7d2918baa2e652ae3184cdd
-
SHA1
baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148
-
SHA256
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4
-
SHA512
b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3
-
SSDEEP
1536:7+uAoFUlrkqG3p26gEOQBApzaSxI81jkfenLBKBJX8LYlo0yaI3EgcBCFEc5T8YH:6hNGujR9msKBdVyEgcBCFEAT8Y+e
Malware Config
Signatures
Files
-
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe windows x86
e7a18b5a4c28a7cc9c9f03f6c760fb73
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetCurrentThreadId
TlsFree
GetLastError
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
LCMapStringW
GetStringTypeW
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CompareStringW
SetEnvironmentVariableA
WriteConsoleW
GetSystemTime
LocalFree
CloseHandle
LocalAlloc
SetLastError
SetThreadLocale
GlobalUnlock
lstrlenW
ReadFile
HeapCreate
CreateEventA
Sleep
CreateFileA
LoadLibraryW
GlobalAlloc
WriteFile
SetEvent
GlobalLock
GetCPInfo
RtlUnwind
DeleteCriticalSection
GetFileType
HeapAlloc
lstrlenA
GetFileSize
TlsSetValue
InitializeCriticalSectionAndSpinCount
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
GetTimeZoneInformation
WideCharToMultiByte
EncodePointer
GetModuleFileNameW
GetStdHandle
DecodePointer
ExitProcess
GetModuleHandleW
GetProcAddress
HeapFree
GetTimeFormatA
GetDateFormatA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
CreateFileW
user32
LoadCursorA
ActivateKeyboardLayout
UpdateWindow
RegisterClassA
GetSystemMetrics
RegisterClassW
AdjustWindowRectEx
EndPaint
SetCursor
GetWindowRect
PostQuitMessage
DrawTextA
SetForegroundWindow
LoadIconA
wsprintfA
SetFocus
SendMessageA
BeginPaint
GetClassInfoW
GetDC
MessageBoxA
InvalidateRect
UnregisterClassA
GetWindowLongA
GetClipboardData
CreateWindowExA
ReleaseDC
GetDlgItem
EndDialog
DefWindowProcA
ShowWindow
GetClassInfoA
gdi32
TextOutA
MoveToEx
BitBlt
LineTo
SetWindowExtEx
SetTextColor
CreateHatchBrush
GetDeviceCaps
CreateFontIndirectA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
Ellipse
SaveDC
GetTextExtentPointA
CreatePen
SetViewportExtEx
GetObjectA
TextOutW
GetStockObject
CloseMetaFile
RestoreDC
CreateSolidBrush
advapi32
CryptDestroyKey
RegQueryValueExA
CryptReleaseContext
CryptAcquireContextA
CryptGetUserKey
CryptDestroyHash
CryptDecrypt
CryptVerifySignatureA
CryptCreateHash
CryptImportKey
RegOpenKeyExA
CryptGetKeyParam
ole32
CreateBindCtx
crypt32
CryptImportPublicKeyInfo
CryptDecodeObjectEx
CryptStringToBinaryA
shlwapi
PathFindFileNameW
StrDupA
setupapi
SetupCopyOEMInfA
msi
ord121
ord64
ord79
ord17
ord124
ord8
ord103
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ