Static task
static1
Behavioral task
behavioral1
Sample
ada998cb2092a168d43b2bb57dd70f828df96537aa6e7175dfdc45b9b987a553.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ada998cb2092a168d43b2bb57dd70f828df96537aa6e7175dfdc45b9b987a553.exe
Resource
win10v2004-20220812-en
General
-
Target
ada998cb2092a168d43b2bb57dd70f828df96537aa6e7175dfdc45b9b987a553
-
Size
448KB
-
MD5
0e80b4df59536096b6a3b1e8c5950600
-
SHA1
a5a5dc0ea1d4db17df6274d295c276c1b8b072be
-
SHA256
ada998cb2092a168d43b2bb57dd70f828df96537aa6e7175dfdc45b9b987a553
-
SHA512
08ecf8efb8e1902cd2f6338c7aa51a58f349080e0b72b886727df0f027f4c4da0544a7ecd74ac84be4aefa1f90bd949525dd1e34e5c23573afb25cc6ab4ccab7
-
SSDEEP
12288:cMadZY1uVz5QLV1XiPsw06iEE6uWbj0C4zmME:cMaQsReuu6RE63b2NE
Malware Config
Signatures
Files
-
ada998cb2092a168d43b2bb57dd70f828df96537aa6e7175dfdc45b9b987a553.exe windows x86
330ed4b8d1856f53161f13b8d10eca4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
CreateMutexA
GetCurrentProcessId
CreateMailslotA
CopyFileA
lstrcatW
CreateEventA
GetTimeFormatA
GetPrivateProfileIntW
CompareStringA
GetVolumePathNameW
InterlockedDecrement
InterlockedIncrement
GetLogicalDrives
SetCurrentDirectoryW
DeleteFileA
GetModuleHandleA
GetStringTypeA
cryptui
WizardFree
CryptUIWizDigitalSign
CryptUIWizImport
CryptUIWizExport
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.EDATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JDATA Size: 501KB - Virtual size: 788KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ