Static task
static1
Behavioral task
behavioral1
Sample
a4a4e8bead58de843d3df70b2d93b531960e661ed0e4bfbf27c4376e4c3c4916.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4a4e8bead58de843d3df70b2d93b531960e661ed0e4bfbf27c4376e4c3c4916.exe
Resource
win10v2004-20221111-en
General
-
Target
a4a4e8bead58de843d3df70b2d93b531960e661ed0e4bfbf27c4376e4c3c4916
-
Size
38KB
-
MD5
38b6cfc37771fd9618d1d76858e23906
-
SHA1
9a4dc85544ebcf979975df148fe530989f470002
-
SHA256
a4a4e8bead58de843d3df70b2d93b531960e661ed0e4bfbf27c4376e4c3c4916
-
SHA512
3047604cc284329cb8b85bb7263dc10724375f4d62bd8bbdc4ed2af05ee04a7d98875c7592387ecb50fa7c4373bd79fab1e637bea12ee2189ef7029412bf30bc
-
SSDEEP
768:A2rqoSjhZEQ7t/X0//Iwhg2ADoZlhkpnBuczgb:A2rq5jrjh/X0k2ADoZlhmnFEb
Malware Config
Signatures
Files
-
a4a4e8bead58de843d3df70b2d93b531960e661ed0e4bfbf27c4376e4c3c4916.exe windows x86
9285ce54b0e25ddb919109877db426ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadStringA
PostQuitMessage
DialogBoxParamA
DestroyWindow
DefWindowProcA
PostMessageA
SendMessageA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
GetMessageA
SetFocus
EndDialog
CreateWindowExA
kernel32
LoadLibraryA
GetModuleHandleA
lstrcpyA
GetModuleFileNameA
SleepEx
GetLastError
GetStartupInfoA
GetCurrentProcess
InitializeCriticalSection
CompareStringW
ReplaceFileA
RemoveDirectoryA
CopyFileA
SetFileAttributesA
msvcrt
_XcptFilter
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__acmdln
exit
_exit
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ