Static task
static1
Behavioral task
behavioral1
Sample
a3aa126065a48c943834bdbc7e2ed427cc157d83fcf58c0941344c7437bbb7ce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3aa126065a48c943834bdbc7e2ed427cc157d83fcf58c0941344c7437bbb7ce.exe
Resource
win10v2004-20221111-en
General
-
Target
a3aa126065a48c943834bdbc7e2ed427cc157d83fcf58c0941344c7437bbb7ce
-
Size
212KB
-
MD5
54e95496538c6d8cd83218714687d9e0
-
SHA1
1d61bfb6b982ac7f647ba011d459d0be38b1054b
-
SHA256
a3aa126065a48c943834bdbc7e2ed427cc157d83fcf58c0941344c7437bbb7ce
-
SHA512
31a13771837699ce0dcd9fb015c9cea2b45f6d004b04bb44b0c45bb99ff7d836d8b8d926e4da5b53fa69b6199d1af39903250aa9b95e6f24f969c3dc4dca5f33
-
SSDEEP
6144:61M6JHphGh3knbdoDbSwEv2pYHad/6LLSmSJHt2V6LC:wJHphGaYbMyL7L
Malware Config
Signatures
Files
-
a3aa126065a48c943834bdbc7e2ed427cc157d83fcf58c0941344c7437bbb7ce.exe windows x86
f7224611d30354767b0b687514c7b44c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
WaitForSingleObject
LocalAlloc
GetOEMCP
IsDebuggerPresent
GetCommandLineA
CreateSemaphoreA
OutputDebugStringA
SetFilePointer
GetCurrentProcessId
GetSystemDirectoryA
LocalFree
SuspendThread
ExitProcess
user32
InSendMessageEx
GetCursor
TranslateMessage
GetForegroundWindow
GetDesktopWindow
GetMessageA
CopyIcon
InSendMessage
SetCapture
DispatchMessageA
CloseClipboard
CreateDialogParamA
IsChild
GetDoubleClickTime
DestroyCursor
IsMenu
DeleteMenu
CheckMenuItem
InsertMenuA
LoadMenuA
GetFocus
GetClientRect
SendMessageA
IsWindowVisible
ntdll
_chkstk
ole32
CoSuspendClassObjects
CoUninitialize
shlwapi
SHReleaseThreadRef
shell32
DuplicateIcon
Sections
.text Size: 168KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ