Static task
static1
Behavioral task
behavioral1
Sample
a85101aaa1863d119847f1cc8271343d1a911f304641a02af953c17ecdae84d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a85101aaa1863d119847f1cc8271343d1a911f304641a02af953c17ecdae84d6.exe
Resource
win10v2004-20220901-en
General
-
Target
a85101aaa1863d119847f1cc8271343d1a911f304641a02af953c17ecdae84d6
-
Size
133KB
-
MD5
80e090c484d6fd131baaafbfdbf109b4
-
SHA1
eb8760d513e957d7871915877534ce9402737799
-
SHA256
a85101aaa1863d119847f1cc8271343d1a911f304641a02af953c17ecdae84d6
-
SHA512
9cbff5dd2bf3335da179cacb383d8e8e0e821ffd7125a6f9cb6e478c1158f89fbc33308400ab953f17e7999b5aa59cf0e63d2b9e67065a0639a58473ab76e89f
-
SSDEEP
3072:0AuMITuSq+I06ZTcWgbvdTt5roi5Bn3RFSd0hX:tuMITdqdZTcbbvVEIBnBS
Malware Config
Signatures
Files
-
a85101aaa1863d119847f1cc8271343d1a911f304641a02af953c17ecdae84d6.exe windows x86
72206cfa6852bd44a4ded56b88b962e6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
UnhandledExceptionFilter
FreeLibrary
FlushFileBuffers
GetFileSize
LoadLibraryA
SetFilePointer
EnterCriticalSection
MultiByteToWideChar
GetStdHandle
FindNextFileA
ExitProcess
TerminateProcess
CreateFileA
GetSystemTimeAsFileTime
WaitForSingleObject
GlobalHandle
GlobalAlloc
InterlockedCompareExchange
FindFirstFileA
lstrcmpiA
GetFullPathNameA
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetFileAttributesA
GetCurrentProcessId
GlobalUnlock
CloseHandle
WideCharToMultiByte
FindClose
CreateProcessA
CreateThread
InitializeCriticalSection
GlobalLock
GetTempPathA
lstrlenA
GetACP
SetFileTime
GetCurrentDirectoryA
HeapSetInformation
WriteFile
SetFileAttributesA
GetExitCodeProcess
GetCurrentProcess
GetTempFileNameA
Sleep
InterlockedExchange
GetModuleHandleA
RtlUnwind
MulDiv
DeleteFileA
DeleteCriticalSection
GetTickCount
CopyFileA
GetFileTime
LeaveCriticalSection
SetCurrentDirectoryA
ExpandEnvironmentStringsA
lstrcpyW
GetVersion
GetCurrentThreadId
VirtualProtect
LoadLibraryExA
GlobalFindAtomW
GetProcAddress
GetStartupInfoA
ExitThread
GetCurrentThread
ReadFile
user32
SetCursor
EndPaint
SetFocus
GetMessageA
SetScrollRange
GetDlgItemTextA
GetSubMenu
PtInRect
LoadIconA
GetDlgItem
ShowWindow
GetDC
CreateDialogParamA
DispatchMessageA
GetClientRect
EmptyClipboard
OpenClipboard
FillRect
CloseClipboard
DrawFocusRect
TrackPopupMenu
SetWindowLongA
GetDesktopWindow
SetScrollInfo
MessageBoxA
ValidateRect
InvertRect
GetMenu
DestroyWindow
PostMessageA
ScrollWindow
SetWindowPos
RedrawWindow
SetCapture
PostQuitMessage
GetSysColor
ReleaseCapture
DrawTextA
TranslateMessage
InvalidateRect
LoadAcceleratorsA
DialogBoxParamA
OffsetRect
EnableMenuItem
GetFocus
CharNextA
ReleaseDC
DestroyMenu
BeginPaint
GetWindowTextLengthA
EndDialog
ClientToScreen
MoveWindow
SetDlgItemTextA
TranslateAcceleratorA
SendDlgItemMessageA
CreateWindowExA
SendMessageA
LoadStringA
SetWindowTextA
CharPrevA
IsDlgButtonChecked
GetWindowRect
PeekMessageA
DefWindowProcA
EnableWindow
GetTopWindow
SetClipboardData
gdi32
CreateSolidBrush
StartPage
GetTextExtentPoint32A
GetStockObject
SelectObject
DeleteDC
ExtTextOutA
LineTo
SetTextColor
CreatePen
SetROP2
AbortDoc
MoveToEx
CreateFontA
ExtTextOutW
SetBkColor
Rectangle
EndPage
GetTextExtentPointA
comdlg32
ChooseFontA
PrintDlgA
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegQueryValueExA
RegCreateKeyA
RegDeleteValueA
RegOpenKeyA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
msvcrt
isalnum
atol
strtoul
__p__fmode
_stricmp
isalpha
memset
strpbrk
_strnicmp
_controlfp
_itoa
_iob
__setusermatherr
isleadbyte
_ltoa
islower
malloc
_mkdir
strchr
memmove
_fileno
__pioinfo
strtok
__set_app_type
_acmdln
_snprintf
strstr
system
_ismbblead
tolower
strcspn
toupper
atoi
_getcwd
free
__getmainargs
isspace
_exit
_amsg_exit
_cexit
__p__commode
_write
_strdup
_errno
_initterm
__badioinfo
strrchr
calloc
isdigit
strncmp
wctomb
memcpy
_lseeki64
_XcptFilter
_isatty
exit
wcspbrk
?terminate@@YAXXZ
_CIsin
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text2 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ