Static task
static1
Behavioral task
behavioral1
Sample
a8e2cdddfe7256a7bfc9489cd4ef51b7b1fa714162974da85306ea42397f8aed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a8e2cdddfe7256a7bfc9489cd4ef51b7b1fa714162974da85306ea42397f8aed.exe
Resource
win10v2004-20221111-en
General
-
Target
a8e2cdddfe7256a7bfc9489cd4ef51b7b1fa714162974da85306ea42397f8aed
-
Size
744KB
-
MD5
af40eade1070fb51320484ff9e2035aa
-
SHA1
c7f902ac94e0d7ca232909f709fca58d3f390df1
-
SHA256
a8e2cdddfe7256a7bfc9489cd4ef51b7b1fa714162974da85306ea42397f8aed
-
SHA512
30cb86f0d7f5fab63d3e1afc17e910ef7a9d5cf6f91dcfeae7533c60cb340cc20919145095ae41c97c690a24d839329fcf5bac306d283edce56a5a4727131ecb
-
SSDEEP
12288:rDEp6KtBiaep5LmwgR7Bp5qOiDp0KWTqp/jcnfeRIaoCukskIJGG9:rQwKLGNm3Rdp5qnp0lyrcnfeRIadbske
Malware Config
Signatures
Files
-
a8e2cdddfe7256a7bfc9489cd4ef51b7b1fa714162974da85306ea42397f8aed.exe windows x86
f4ef38313030f33a9fabff793e0afde8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
kernel32
FormatMessageA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetModuleHandleA
VirtualAlloc
CreateEventA
GetLocaleInfoW
GetStartupInfoW
GetTempPathA
CompareStringA
GetStartupInfoA
GetVersionExA
GetLastError
CreateDirectoryA
GetSystemTimeAsFileTime
ExitThread
CreateFileA
GetACP
GetVersion
GetFileSize
FindResourceW
GetStdHandle
CreateThread
GetModuleHandleW
GetConsoleMode
CopyFileW
GetThreadTimes
GetSystemInfo
GetTempFileNameA
CloseHandle
GetTempPathW
EnumSystemLocalesA
CompareStringW
GetSystemTime
FreeLibrary
ExpandEnvironmentStringsA
GetStringTypeW
GetCurrentDirectoryA
ExitProcess
GetModuleFileNameA
GetCurrentThreadId
GetTempFileNameW
DeleteCriticalSection
GetCurrentThread
CreateProcessW
GetShortPathNameA
CreateProcessA
GetConsoleCP
CreateEventW
FileTimeToLocalFileTime
CopyFileA
GetTimeFormatA
GetFileType
GetShortPathNameW
CreateMutexA
GetModuleFileNameW
GetCurrentProcessId
CreateMutexW
FindResourceA
CreateFileMappingW
GetLocaleInfoA
CreateFileW
GetCurrentDirectoryW
GetTickCount
GetCPInfo
GetProcessHeap
GetThreadLocale
CreateDirectoryW
CreateFileMappingA
GetFileTime
GetStringTypeA
GetLocalTime
FindResourceExW
GetCommandLineA
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
WriteFile
HeapAlloc
HeapReAlloc
IsBadWritePtr
SetStdHandle
FlushFileBuffers
GetOEMCP
GetProcAddress
LoadLibraryA
SetFilePointer
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 648KB - Virtual size: 651KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE