Static task
static1
Behavioral task
behavioral1
Sample
a82ab63598ac7b7c3a4da75e1baa307901308673be639af95375b66520a08ad1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a82ab63598ac7b7c3a4da75e1baa307901308673be639af95375b66520a08ad1.exe
Resource
win10v2004-20220901-en
General
-
Target
a82ab63598ac7b7c3a4da75e1baa307901308673be639af95375b66520a08ad1
-
Size
716KB
-
MD5
d351ca8f2657483730f97d3b054decc7
-
SHA1
6778dfba67ab3a37ef3bceff521f902c2b882455
-
SHA256
a82ab63598ac7b7c3a4da75e1baa307901308673be639af95375b66520a08ad1
-
SHA512
f6519d5a49c3d6078560520a8e3860ee38600c3e2d2b4848de351d799793ae42e9dc4bcd09832782441672f983a910b8a8e6585699be96df801e9cc683d1046e
-
SSDEEP
12288:4pf16/5c+ff3o8ZKrLYDl3NJ9mwGDfn0l//doxXE1Z3zCmlp:0fU/5c+ffuvEb9me2xy3zCm
Malware Config
Signatures
Files
-
a82ab63598ac7b7c3a4da75e1baa307901308673be639af95375b66520a08ad1.exe windows x86
76f9aa54daf2b9cfc2eccef3a030fd69
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteDC
GdiGetBatchLimit
GetBitmapBits
DeleteObject
GetObjectW
SelectObject
GetDeviceCaps
CreateDCA
advapi32
CryptSetProviderW
RegSetValueExA
CryptAcquireContextW
StartServiceW
LookupSecurityDescriptorPartsW
RegSetValueA
LookupAccountSidW
LookupAccountSidA
CryptVerifySignatureW
RegDeleteValueA
LookupSecurityDescriptorPartsA
CryptGenKey
RegDeleteKeyW
kernel32
TlsAlloc
SetFilePointer
ReadConsoleOutputCharacterW
HeapDestroy
GetEnvironmentVariableW
RtlUnwind
GetAtomNameA
UnhandledExceptionFilter
WriteFile
GetStringTypeW
TlsGetValue
SetEnvironmentVariableA
GetLastError
EnterCriticalSection
GetComputerNameA
GetTempFileNameA
CreateMutexA
GetLongPathNameA
GetDateFormatA
HeapAlloc
QueryPerformanceCounter
HeapLock
LeaveCriticalSection
GetPrivateProfileStringA
GetProcAddress
GetACP
GetTickCount
TlsFree
GlobalUnlock
SetStdHandle
LoadLibraryA
SetConsoleCursorInfo
GetSystemTimeAsFileTime
SetConsoleCursorPosition
IsValidCodePage
GetStringTypeA
GetLogicalDriveStringsW
GetCurrentThread
HeapFree
GlobalFix
GetSystemDirectoryW
WriteConsoleA
WriteProfileSectionW
CloseHandle
CompareStringA
InterlockedExchange
GetUserDefaultLCID
GetVersionExA
VirtualFree
GetFileType
GetEnvironmentStringsW
ReadFile
HeapCreate
MultiByteToWideChar
GetTimeFormatA
GetThreadSelectorEntry
FoldStringA
lstrcmpi
GetModuleFileNameA
GetSystemInfo
EnumCalendarInfoExA
HeapSize
IsValidLocale
InitializeCriticalSection
LoadLibraryW
VirtualQueryEx
VirtualAlloc
GetModuleHandleA
GetConsoleCursorInfo
SetHandleCount
OutputDebugStringA
FillConsoleOutputAttribute
SetLastError
LCMapStringA
EnumDateFormatsExW
GetOEMCP
VirtualProtect
WideCharToMultiByte
GetEnvironmentStrings
FreeEnvironmentStringsA
GetLocaleInfoA
IsBadWritePtr
ExitProcess
GlobalDeleteAtom
FlushFileBuffers
GetCommandLineA
TlsSetValue
GetSystemTime
GetCPInfo
CopyFileExA
GetStdHandle
GetAtomNameW
GetCurrentThreadId
OpenMutexA
FreeEnvironmentStringsW
GetProfileStringW
GetStartupInfoA
LockFileEx
GetLocaleInfoW
GetCurrentProcessId
LCMapStringW
CompareStringW
GetTimeZoneInformation
HeapReAlloc
EnumSystemLocalesA
DeleteCriticalSection
CreateEventW
WritePrivateProfileStructA
TerminateProcess
CreateMailslotA
WaitForSingleObjectEx
GetCurrentProcess
VirtualQuery
user32
GetClientRect
SetForegroundWindow
GetParent
RegisterClassA
GetScrollInfo
WaitMessage
DestroyWindow
ChangeMenuW
MapVirtualKeyA
GetSubMenu
CreatePopupMenu
CallNextHookEx
EndPaint
SetWindowPos
OpenWindowStationA
LookupIconIdFromDirectory
GetUserObjectSecurity
SendIMEMessageExW
CreateAcceleratorTableA
CreateCaret
RegisterClassExW
ReleaseDC
DestroyIcon
SetRect
DrawFrameControl
GetShellWindow
VkKeyScanExA
ModifyMenuW
GetDC
SetKeyboardState
SetMenuItemBitmaps
DrawTextExA
SetMenuContextHelpId
GetMonitorInfoA
RegisterClassExA
CascadeWindows
LoadMenuIndirectW
GetDlgItemInt
CallMsgFilterA
DlgDirSelectComboBoxExA
IsDialogMessageW
ClipCursor
GetMessageTime
MessageBoxExW
shell32
SHGetSettings
comctl32
CreatePropertySheetPageW
CreateStatusWindow
ImageList_GetImageInfo
ImageList_SetIconSize
InitCommonControlsEx
CreateUpDownControl
Sections
.text Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 392KB - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ