Static task
static1
Behavioral task
behavioral1
Sample
a4ae5a64ab176e03c0e377ed222f60e2e8bdb5e6562528ed1eb6e027f80c8838.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4ae5a64ab176e03c0e377ed222f60e2e8bdb5e6562528ed1eb6e027f80c8838.exe
Resource
win10v2004-20221111-en
General
-
Target
a4ae5a64ab176e03c0e377ed222f60e2e8bdb5e6562528ed1eb6e027f80c8838
-
Size
675KB
-
MD5
ede4c947193e90bbfc6ace7374e910f0
-
SHA1
cbe92a4469d590cbd19ef5c6920b4d44545d7756
-
SHA256
a4ae5a64ab176e03c0e377ed222f60e2e8bdb5e6562528ed1eb6e027f80c8838
-
SHA512
264b56001fa6adb717118f47fe9593a9deb01219fd0e3e60f74ec17ef5873e376c19cc9781639fd03f54dd6af2574a3e687d428ba4541c0eb58046796161a832
-
SSDEEP
12288:xCZrRHiCrBpZJmXFIKCvrfvaqOrHNpmbfx/GsIZpv:xCZFHiWBA1IKC7inLaTVGsIZl
Malware Config
Signatures
Files
-
a4ae5a64ab176e03c0e377ed222f60e2e8bdb5e6562528ed1eb6e027f80c8838.exe windows x86
5eb884d2bc7abd40e51920dbb36878a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ActivateActCtx
CreateActCtxA
CreateThread
ExitProcess
GetCurrentDirectoryA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
LoadLibraryA
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
ConvertDefaultLocale
HeapSize
GetFileType
GetFullPathNameW
LoadResource
CreateFileA
user32
MessageBoxA
GetDC
GetActiveWindow
GetMenuState
GetScrollInfo
LoadCursorW
GetMessagePos
gdi32
GetBkMode
GetBkColor
ole32
CoCreateInstance
CreateStreamOnHGlobal
OleIsCurrentClipboard
comctl32
ImageList_Add
_TrackMouseEvent
ImageList_Destroy
advapi32
RegCloseKey
RegDeleteKeyW
RegSetValueExW
RegOpenKeyExW
comdlg32
GetFileTitleW
GetOpenFileNameW
shell32
DragFinish
ShellExecuteExW
Sections
.text Size: 607KB - Virtual size: 607KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE