Static task
static1
Behavioral task
behavioral1
Sample
a520fabca32c5960ec8d45f4069024504cbddfd9f91f42cb0ab9990580e1b0d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a520fabca32c5960ec8d45f4069024504cbddfd9f91f42cb0ab9990580e1b0d6.exe
Resource
win10v2004-20220812-en
General
-
Target
a520fabca32c5960ec8d45f4069024504cbddfd9f91f42cb0ab9990580e1b0d6
-
Size
107KB
-
MD5
bbe6f9b65ab40a88f8aa5790e79b4769
-
SHA1
99b8652c78eb091306d45bda163d16f02d6d5e95
-
SHA256
a520fabca32c5960ec8d45f4069024504cbddfd9f91f42cb0ab9990580e1b0d6
-
SHA512
33ed75404fc288659c689bbb6465a8b94a75053d4548d748cc77a26bdbc1c42f6c393df7435a7f529b9e05aa36da8da42241093b478e3f764daa99fe945452b4
-
SSDEEP
3072:k8EE5iHmnKlX1M625hWuDxUa47fMo6dCl5dvCh:kv+kKz5a50
Malware Config
Signatures
Files
-
a520fabca32c5960ec8d45f4069024504cbddfd9f91f42cb0ab9990580e1b0d6.exe windows x86
b496ff6f7a3596971eca54cc54a79354
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegOverridePredefKey
RegOpenKeyA
kernel32
GetLocaleInfoA
lstrcmpiA
FindClose
FindNextFileA
FindFirstFileA
CloseHandle
GetLocalTime
WriteFile
lstrlenA
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileA
GetDiskFreeSpaceA
GetLastError
CreateDirectoryA
SystemTimeToFileTime
GetSystemTime
DeleteFileA
lstrcmpA
TlsSetValue
TlsGetValue
ReleaseMutex
TlsFree
TlsAlloc
WaitForSingleObject
CreateMutexA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
IsDBCSLeadByteEx
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SetUnhandledExceptionFilter
user32
SetFocus
CheckDlgButton
SetForegroundWindow
EndDialog
IsDlgButtonChecked
DialogBoxParamA
MessageBoxA
ShowWindow
CreateDialogParamA
GetDesktopWindow
IsDialogMessageA
TranslateMessage
PeekMessageA
LoadStringA
GetDlgItem
SendMessageA
SetDlgItemTextA
DestroyWindow
CharPrevA
SetWindowPos
OffsetRect
DispatchMessageA
SystemParametersInfoA
GetParent
GetWindowRect
comctl32
InitCommonControlsEx
shlwapi
wnsprintfA
StrFormatByteSize64A
ole32
CoInitialize
CoGetMalloc
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE