Static task
static1
Behavioral task
behavioral1
Sample
a18936d40615b72e88883690d3889a6318fa887427b902a692cdbd4c7faed7ea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a18936d40615b72e88883690d3889a6318fa887427b902a692cdbd4c7faed7ea.exe
Resource
win10v2004-20221111-en
General
-
Target
a18936d40615b72e88883690d3889a6318fa887427b902a692cdbd4c7faed7ea
-
Size
137KB
-
MD5
6e363ae57b16b5a79246b65c95744e74
-
SHA1
d0d0c4e7b770c4c4a635f70d38f0c7bca0e0daac
-
SHA256
a18936d40615b72e88883690d3889a6318fa887427b902a692cdbd4c7faed7ea
-
SHA512
709da0bca19d9f95ef8e2e87986498bf13c521cd0995dfed889cedd59bd86c069362eb256c63c97fc57a1e6b5adb761e5ccd2d887b13985b2e6a0ac07260926e
-
SSDEEP
1536:WQ8k3Jx8tf3oDph99y4hf4PaR/yEzI8lOK6UTllAsHvD0KsggR:7nxe4DphzvR/yEzllN6Kf5sbR
Malware Config
Signatures
Files
-
a18936d40615b72e88883690d3889a6318fa887427b902a692cdbd4c7faed7ea.exe windows x86
50ec47d0bf6417d066480feb01d3686e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteExW
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteW
SHGetMalloc
ole32
CoCreateInstance
CreateStreamOnHGlobal
CoInitialize
gdi32
StretchBlt
CreateFontIndirectW
DeleteObject
GetDeviceCaps
GetObjectW
CreateCompatibleDC
SelectObject
CreateCompatibleBitmap
SetStretchBltMode
DeleteDC
GetCurrentObject
kernel32
GetStringTypeA
GetStringTypeW
DecodePointer
GlobalUnWire
SetProcessPriorityBoost
BindIoCompletionCallback
GetModuleFileNameW
GetThreadTimes
LockFileEx
MapUserPhysicalPages
SetLastError
CloseHandle
FreeUserPhysicalPages
AreFileApisANSI
ClearCommBreak
GetCurrentProcessId
GetFileAttributesExW
GlobalWire
QueryInformationJobObject
PurgeComm
LockFile
CreateFileMappingW
IsWow64Process
LocalCompact
ReplaceFileA
CreateNamedPipeW
GetEnvironmentStringsW
CreateFiber
SetTapePosition
CreateMemoryResourceNotification
GetFileType
SetSystemTimeAdjustment
WTSGetActiveConsoleSessionId
GetCommandLineW
EscapeCommFunction
GetNamedPipeInfo
RemoveVectoredExceptionHandler
GetVersion
CreateIoCompletionPort
EncodePointer
ConvertThreadToFiber
SetMessageWaitingIndicator
GetMailslotInfo
ReleaseMutex
GetLastError
PulseEvent
GetCommModemStatus
ReleaseSemaphore
FlushFileBuffers
SetFileApisToOEM
GetProcessHeap
ResetWriteWatch
FlushViewOfFile
GetNamedPipeHandleStateA
GetCommandLineA
GetStartupInfoA
RtlUnwind
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
Sections
.text Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ