Static task
static1
Behavioral task
behavioral1
Sample
48344a98747197a7e4660d79c1ea3a787f74073d6862fb95aec3dc0a5dae1eb3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48344a98747197a7e4660d79c1ea3a787f74073d6862fb95aec3dc0a5dae1eb3.exe
Resource
win10v2004-20220901-en
General
-
Target
48344a98747197a7e4660d79c1ea3a787f74073d6862fb95aec3dc0a5dae1eb3
-
Size
149KB
-
MD5
ab6c12ebc0edf3b66c5ddb7a20023cbf
-
SHA1
2aaea85f0771e1b40553629099c8a20c4a14c6b0
-
SHA256
48344a98747197a7e4660d79c1ea3a787f74073d6862fb95aec3dc0a5dae1eb3
-
SHA512
d0d94f5047e399cbf4b66c251fcaae41e6f3f1c171aa7fd2554afcd3609b587326e00fbd89460ce415085378e710a94e942239264a2610c03165c7ed781873f8
-
SSDEEP
3072:VkMwuGcvhkLdN3FZJ16ckEdzUd0LlOXubSDADeak7dJHB/AX:MuGR7tjkEo00uSsQLH5AX
Malware Config
Signatures
Files
-
48344a98747197a7e4660d79c1ea3a787f74073d6862fb95aec3dc0a5dae1eb3.exe windows x86
b913c863aaf026f9650437f2556fb381
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegOpenKeyExA
RegQueryValueExA
comctl32
ImageList_AddMasked
ImageList_Create
InitCommonControls
comdlg32
GetOpenFileNameA
GetSaveFileNameA
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateFileA
CreateThread
DeleteFileA
ExitProcess
FileTimeToDosDateTime
FindAtomA
FindFirstFileA
FindNextFileA
GetAtomNameA
GetCommandLineA
GetFileAttributesA
GetFileTime
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempFileNameA
GetTickCount
GetWindowsDirectoryA
LoadLibraryExA
MoveFileA
OpenFile
SetCurrentDirectoryA
SetUnhandledExceptionFilter
WriteFile
msvcrt
_strdup
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
_snprintf
_vsnprintf
abort
atexit
calloc
exit
fclose
fflush
fgets
fopen
fprintf
fread
free
fseek
fwrite
isxdigit
malloc
memcmp
memcpy
memmove
memset
perror
printf
signal
sprintf
sscanf
strchr
strcmp
strcpy
strlen
strncat
strncmp
strncpy
strtok
strtoul
time
netapi32
Netbios
ole32
CoInitializeEx
shell32
ShellExecuteA
user32
BeginDeferWindowPos
CreateDialogParamA
DeferWindowPos
DestroyWindow
DialogBoxParamA
DispatchMessageA
EnableWindow
EndDeferWindowPos
EndDialog
GetClientRect
GetDlgItem
GetMessageA
GetSubMenu
GetSysColor
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
IsDialogMessageA
IsIconic
KillTimer
LoadIconA
LoadImageA
LoadMenuA
MapWindowPoints
MessageBoxA
PeekMessageA
PostMessageA
SendMessageA
SetClassLongA
SetFocus
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenuEx
TranslateMessage
UpdateWindow
ws2_32
WSAAddressToStringA
WSAAsyncSelect
WSACleanup
WSAGetLastError
WSAStartup
bind
closesocket
connect
freeaddrinfo
getaddrinfo
htonl
htons
inet_ntoa
ioctlsocket
ntohl
ntohs
recv
recvfrom
select
send
sendto
setsockopt
socket
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ctors Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dtors Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE