Static task
static1
Behavioral task
behavioral1
Sample
a056b6d703b8a7562aef880375e85d08fac98b8978b06865ad48a0a7273d0ee9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a056b6d703b8a7562aef880375e85d08fac98b8978b06865ad48a0a7273d0ee9.exe
Resource
win10v2004-20221111-en
General
-
Target
a056b6d703b8a7562aef880375e85d08fac98b8978b06865ad48a0a7273d0ee9
-
Size
667KB
-
MD5
0697e60dbda2527260fe69a501b4bbb1
-
SHA1
bfec0c896267e6aaade1ada868e6d4abaf49eb89
-
SHA256
a056b6d703b8a7562aef880375e85d08fac98b8978b06865ad48a0a7273d0ee9
-
SHA512
17288e7a64ae14aeb646c053a430d748f7afa301891d1b2a2dabd9bb407e165ba6eabe8fdc9da03299bd7ff4993e53f1b42605408f9327c36d177a21d11cd0dc
-
SSDEEP
12288:Pfpozo7HyPdCFZWnLDjfBFim6fno9flF8kw34xJwXC:HpoqSPounLDiho9flF8kw5XC
Malware Config
Signatures
Files
-
a056b6d703b8a7562aef880375e85d08fac98b8978b06865ad48a0a7273d0ee9.exe windows x86
ab2b9a1bdfca06a5458c5523e97736af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
GetStartupInfoW
ReadFile
GetOEMCP
CompareFileTime
GetFileAttributesExA
FindFirstFileExW
SetHandleCount
GetConsoleScreenBufferInfo
VerifyVersionInfoA
HeapFree
EnterCriticalSection
GetHandleInformation
GetFullPathNameW
GetStdHandle
ReleaseSemaphore
WriteFile
VirtualAlloc
TerminateProcess
GetProcessAffinityMask
GetCommModemStatus
SetThreadUILanguage
LocalHandle
SignalObjectAndWait
FindNextFileA
SetThreadPriority
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
SetErrorMode
SetFilePointer
GetEnvironmentVariableW
SetEndOfFile
GetTempPathW
FindResourceA
CreateFileW
GetCurrentThreadId
GetSystemDirectoryW
GetCurrentDirectoryA
GetLocaleInfoA
OpenProcess
CreateEventW
EnumSystemLocalesA
MultiByteToWideChar
Sleep
GetConsoleMode
GetTempPathA
GetDiskFreeSpaceA
GetDevicePowerState
GetLastError
ChangeTimerQueueTimer
GetCalendarInfoW
GetConsoleProcessList
EnumCalendarInfoExA
MoveFileExA
GetUserDefaultLCID
SetEvent
GetCurrentThread
GetSystemDirectoryA
GlobalAlloc
lstrcpyA
GlobalFree
HeapReAlloc
EnumSystemCodePagesA
RaiseException
FindResourceW
GetLocalTime
SwitchToThread
CreateFileMappingA
LocalFree
HeapQueryInformation
GetFileSize
DeleteCriticalSection
ExitProcess
SetEnvironmentVariableA
GetCurrentProcessId
UnhandledExceptionFilter
EnumSystemLocalesW
FreeLibrary
WideCharToMultiByte
GetConsoleWindow
lstrcmpiA
SystemTimeToTzSpecificLocalTime
CreateProcessA
SetConsoleOutputCP
GetSystemTimeAsFileTime
GetComputerNameExA
CreateDirectoryA
GetSystemTime
SetFileValidData
OpenMutexW
GetEnvironmentStringsW
GlobalUnlock
MulDiv
EnumDateFormatsExA
GetConsoleSelectionInfo
QueryDepthSList
GetCurrentConsoleFont
Sections
.text Size: 576KB - Virtual size: 575KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ