Static task
static1
Behavioral task
behavioral1
Sample
a473e493dad69c31397d20123da559dc77810a0c1da384eaa0cac53f248028d3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a473e493dad69c31397d20123da559dc77810a0c1da384eaa0cac53f248028d3.exe
Resource
win10v2004-20220812-en
General
-
Target
a473e493dad69c31397d20123da559dc77810a0c1da384eaa0cac53f248028d3
-
Size
193KB
-
MD5
4d7450b2d89c868a94527ce5ed46d154
-
SHA1
50381c9bad8b880463fd2644a20d731ac8e1b6ed
-
SHA256
a473e493dad69c31397d20123da559dc77810a0c1da384eaa0cac53f248028d3
-
SHA512
28ad1181391b55e63ad427e73365782008b8afb5b53395b5cb6ece571acd073751809a421c21524efd125a766eb454c0bc3de816d858336ae702a01166d3bd0e
-
SSDEEP
6144:CWUiBhDCSW1+Wh9LkvMk/9iYhldOipAX:DkR+Wn2l9Wip
Malware Config
Signatures
Files
-
a473e493dad69c31397d20123da559dc77810a0c1da384eaa0cac53f248028d3.exe windows x86
0e52d3d3dff3aa3a292d905cc5d0228e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
FindFirstFileW
FindNextFileW
FindClose
CopyFileW
CreateDirectoryA
ResetEvent
WaitForMultipleObjects
VirtualFree
VirtualProtect
VirtualAlloc
GetCurrentThreadId
GetCommandLineA
GetModuleHandleA
MoveFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
HeapSize
SetFilePointer
VirtualQuery
InterlockedExchange
RtlUnwind
GetOEMCP
GetACP
LoadLibraryA
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
LocalFree
LocalAlloc
GetVersion
GetTempFileNameA
GetFileAttributesA
CreateThread
MoveFileW
RemoveDirectoryW
InterlockedIncrement
InterlockedCompareExchange
CopyFileA
DeleteFileA
FindFirstChangeNotificationA
GetCurrentProcessId
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetVersionExA
HeapFree
GetLastError
CloseHandle
ExitProcess
GetProcAddress
GetSystemInfo
user32
SetParent
SetCursor
IntersectRect
InsertMenuItemA
ClientToScreen
InflateRect
GetWindowThreadProcessId
LoadBitmapA
GetIconInfo
DrawEdge
IsDlgButtonChecked
DrawIconEx
AppendMenuA
CreatePopupMenu
DrawFrameControl
FillRect
IsDialogMessageW
PostMessageA
CreateDialogIndirectParamA
DialogBoxIndirectParamA
SetWindowLongA
GetWindowRect
GetSystemMetrics
GetForegroundWindow
GetClientRect
SendMessageW
PostMessageW
DispatchMessageA
gdi32
GetObjectA
SelectClipRgn
CreateRectRgn
GetPixel
PtVisible
CreateFontA
GetStockObject
DPtoLP
CreateDCA
CreatePen
DeleteObject
DeleteDC
SetMapMode
ole32
OleInitialize
CoRegisterSurrogate
CoRegisterClassObject
CoCreateInstance
CoInitialize
CoUninitialize
OleUninitialize
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ