Static task
static1
Behavioral task
behavioral1
Sample
a4b500410f7e6496bd4ee8f6e7c3c64bd99996b1cb73fad00098830c08fc25ae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4b500410f7e6496bd4ee8f6e7c3c64bd99996b1cb73fad00098830c08fc25ae.exe
Resource
win10v2004-20220812-en
General
-
Target
a4b500410f7e6496bd4ee8f6e7c3c64bd99996b1cb73fad00098830c08fc25ae
-
Size
4.3MB
-
MD5
2ce5ead8b74cf42d82bb7410b4b21a91
-
SHA1
72299448fd1226c9db114714fcfdf9d8291f1f64
-
SHA256
a4b500410f7e6496bd4ee8f6e7c3c64bd99996b1cb73fad00098830c08fc25ae
-
SHA512
d483ae4d0251104de2fbff40f402be77f40c7a1fe388d14217ec4a5056bfd8fbe9b286683f89c6d6e1cb661b5cfa4c45c9ddb0f4ca12394a8bd59966d93d0b10
-
SSDEEP
49152:qhOqIruzyb7SO6rmxup4/dGKvghxfki1tPXGIjQkB+lyzEJ3jL/:ouuzAT6dKcTP2iQ1YiTL
Malware Config
Signatures
Files
-
a4b500410f7e6496bd4ee8f6e7c3c64bd99996b1cb73fad00098830c08fc25ae.exe windows x86
39228d1d228f54cebd3bf9d13ef87302
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObjectEx
GetFileAttributesA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
HeapFree
CreateMutexA
GetModuleHandleExW
Sleep
GetLastError
GetProcessHeap
InterlockedCompareExchange
SetLastError
GetVersionExA
GetModuleHandleA
HeapReAlloc
LeaveCriticalSection
DisableThreadLibraryCalls
CreateFileW
VirtualAlloc
VirtualFree
GetTempPathA
GetProcAddress
LoadLibraryA
RemoveDirectoryA
EnterCriticalSection
CloseHandle
GetCurrentThreadId
LocalFileTimeToFileTime
ReadFile
GetTickCount
ExitProcess
WriteConsoleW
GetConsoleCP
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
LCMapStringW
LoadLibraryExW
GetModuleHandleW
TlsFree
TlsSetValue
SetEndOfFile
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
InterlockedDecrement
AreFileApisANSI
HeapSize
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetStringTypeW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
advapi32
RegEnumKeyExW
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegCreateKeyExA
RegOpenKeyW
RegEnumKeyExA
user32
GetWindowRect
CreateWindowExW
GetClientRect
GetWindowTextW
RegisterClassExA
RegisterWindowMessageA
SetWindowPos
PostQuitMessage
RegisterClassExW
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RedrawWindow
SetForegroundWindow
PostMessageW
SendMessageA
DefWindowProcA
RegisterWindowMessageW
MessageBoxW
SendMessageW
TrackPopupMenu
ShowWindow
UpdateWindow
FindWindowW
GetParent
LoadIconW
PostMessageA
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ