Static task
static1
Behavioral task
behavioral1
Sample
f4afc6a30dc2fad03d4b01e6212a256c680b8f291c0058d7064620e277617373.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4afc6a30dc2fad03d4b01e6212a256c680b8f291c0058d7064620e277617373.exe
Resource
win10v2004-20220812-en
General
-
Target
f4afc6a30dc2fad03d4b01e6212a256c680b8f291c0058d7064620e277617373
-
Size
123KB
-
MD5
220cef37b0be6467961a82743cca818d
-
SHA1
ac5692b01c0e6024bb8f79676c3e2b461de87264
-
SHA256
f4afc6a30dc2fad03d4b01e6212a256c680b8f291c0058d7064620e277617373
-
SHA512
6ad03cad77d60295cb3a4896f594c693a68ef6b617611ba1123c425bbc62b0863c44ef83abc229127e5416d6bd8772657334d787ec5d57f0ee89c748df80061b
-
SSDEEP
3072:VN0V2XApcvIsHIDVcvmHxE8DNchnpJi1Sp8lAWuWLp5O0:V6bcvI3BxHxj0npJ6LlAWu080
Malware Config
Signatures
Files
-
f4afc6a30dc2fad03d4b01e6212a256c680b8f291c0058d7064620e277617373.exe windows x86
164cfcac541a7ac8708f5df850d78093
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
lstrcmpA
lstrlenA
lstrcpynA
GetTickCount
WriteFile
GetCommandLineA
lstrcatA
GetLastError
GetProcAddress
VirtualAlloc
GetTempFileNameA
GetLocalTime
LoadLibraryA
OpenMutexA
FindAtomA
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
lstrcpyA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualQuery
RtlUnwind
IsDebuggerPresent
user32
GetWindowRect
ClientToScreen
wsprintfA
InflateRect
GetCursorPos
GetCaretPos
EqualRect
IsWindowVisible
GetFocus
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE