Static task
static1
Behavioral task
behavioral1
Sample
aca2a52ce627866a065d38f7119c3300d09a032ca1714b662018d945031621fa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aca2a52ce627866a065d38f7119c3300d09a032ca1714b662018d945031621fa.exe
Resource
win10v2004-20220901-en
General
-
Target
aca2a52ce627866a065d38f7119c3300d09a032ca1714b662018d945031621fa
-
Size
266KB
-
MD5
f0245de5de57a8e36083f2d8919be058
-
SHA1
e27e5656e9f37a5fb51a729dc9188221d6a0b253
-
SHA256
aca2a52ce627866a065d38f7119c3300d09a032ca1714b662018d945031621fa
-
SHA512
956a50a6f11796dc523c74a7b05fb97c1bbdc642d9c55161ffcd2735a0641f34af37e439c5cccf44e374d715ddd7821e3410166ecea1bf9f2b148c66ab7c4635
-
SSDEEP
6144:3kVRrOiwNGXvfyoZ2k42tkJWEIUgfOubd1in6MukY3XTl:UV2NGffB2kyJWE0fXXiu73XTl
Malware Config
Signatures
Files
-
aca2a52ce627866a065d38f7119c3300d09a032ca1714b662018d945031621fa.exe windows x86
8ab41462ecd3755bfa817cbcce3f3f59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
TlsGetValue
InitializeCriticalSection
FindClose
GetCurrentThreadId
LoadLibraryW
LocalFree
WriteFile
HeapCreate
CreateEventW
FindAtomA
GetEnvironmentVariableW
GetDriveTypeA
ReleaseMutex
GetCurrentProcessId
GetPrivateProfileStringA
IsBadStringPtrW
GlobalFlags
GetFileTime
lstrlenW
user32
SetFocus
DrawStateW
DrawTextA
IsWindow
GetKeyboardType
CreateWindowExA
GetClassInfoA
EndDialog
DispatchMessageA
CallWindowProcW
GetClientRect
GetSysColor
GetSysColor
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
cryptui
LocalEnroll
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 254KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ