Static task
static1
Behavioral task
behavioral1
Sample
a1e3560c20ed0a55b8d031aade64a48501658511aa1f58b664570c9990701510.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a1e3560c20ed0a55b8d031aade64a48501658511aa1f58b664570c9990701510.exe
Resource
win10v2004-20221111-en
General
-
Target
a1e3560c20ed0a55b8d031aade64a48501658511aa1f58b664570c9990701510
-
Size
112KB
-
MD5
b3bee7a86bba5131b50611d64ebcc7f6
-
SHA1
848c2cc498e244fb49ea7078ad698b79ec0fdf4a
-
SHA256
a1e3560c20ed0a55b8d031aade64a48501658511aa1f58b664570c9990701510
-
SHA512
8fdc7166c413949ffdcf46a174e4ccfe69a3d86cd2c53b704d29d651b06fe4bc623dc8caaebab1ac58b3e64134d1eb5878c6556864008a4a58f02c0ecc4b5b8a
-
SSDEEP
1536:0iTSebRAlQEnahuC8wL7NaSDsTBIJaC6kvuAxZKsIGTh/2lIVIophbV1jZo1:ieF7EWHQp9I1vxdTh/2lGdhbzjZa
Malware Config
Signatures
Files
-
a1e3560c20ed0a55b8d031aade64a48501658511aa1f58b664570c9990701510.exe windows x86
1a5ae881cc269c1d550cc0a0c953bf56
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
ExitProcess
GetPrivateProfileSectionNamesW
SetConsoleLocalEUDC
GetCurrentProcess
FreeConsole
GetCommandLineW
GetDiskFreeSpaceExA
GetModuleHandleA
SetErrorMode
GetFullPathNameA
VirtualAllocEx
GetLocalTime
FindFirstVolumeMountPointA
user32
InvalidateRect
LockWindowUpdate
LoadBitmapW
RegisterTasklist
SetClassWord
CallMsgFilterA
EnumWindowStationsA
GetSysColor
LoadStringA
TabbedTextOutA
ChangeDisplaySettingsExA
gdi32
SetBoundsRect
PolyTextOutA
Sections
.text Size: 100KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.textbbs Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ