Static task
static1
Behavioral task
behavioral1
Sample
ad54cff2d0f8ec3e9a442213efea3ee27a895102175f270a487751c8ea9a1ac0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad54cff2d0f8ec3e9a442213efea3ee27a895102175f270a487751c8ea9a1ac0.exe
Resource
win10v2004-20221111-en
General
-
Target
ad54cff2d0f8ec3e9a442213efea3ee27a895102175f270a487751c8ea9a1ac0
-
Size
275KB
-
MD5
41c1e69d1b0615835d3f63bf2d117b60
-
SHA1
eb6594e6ca199cd343dcf9d63aedcd89dfec6ec7
-
SHA256
ad54cff2d0f8ec3e9a442213efea3ee27a895102175f270a487751c8ea9a1ac0
-
SHA512
4355296ab95c70217fec34db22681d74a3943e05de97cb44fea5f48f5bd72ecab46f704307d8b01244e5634c39b09d1e2550b44c67c2076074cde3efaea55082
-
SSDEEP
3072:1aM74bUOTAjzX7rOHkLcYML4vv1Npzb2xwD8q1JFFGAXfUCXHSRc7ueO:s44b7czaELLMEHdW08qvFsRc7c
Malware Config
Signatures
Files
-
ad54cff2d0f8ec3e9a442213efea3ee27a895102175f270a487751c8ea9a1ac0.exe windows x86
cf886b7e83e18f556c257c4578312b9a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetSystemTime
CreateThread
WaitForMultipleObjects
SetEvent
GetProcessHeap
HeapFree
GetUserDefaultLCID
RaiseException
InterlockedDecrement
InterlockedIncrement
CloseHandle
LoadResource
LockResource
GetThreadLocale
FreeLibrary
GetSystemInfo
QueryDosDeviceW
QueryDosDeviceA
lstrlenA
GetSystemDirectoryW
GetSystemDirectoryA
UnmapViewOfFile
GetDriveTypeA
GetDateFormatW
CreateMutexW
CreateMutexA
CompareStringW
GetShortPathNameA
GetWindowsDirectoryW
GlobalLock
GlobalSize
GlobalAlloc
GlobalUnlock
GlobalFree
GetLocaleInfoA
CreateFileMappingW
CreateFileMappingA
GetVersionExW
SetFileAttributesW
SetFileAttributesA
IsBadWritePtr
lstrcmpiW
lstrcmpiA
LoadLibraryExW
LoadLibraryExA
LoadLibraryW
LoadLibraryA
LCMapStringW
LCMapStringA
GetVolumeInformationW
GetTempPathA
GetTempFileNameW
GetTempFileNameA
GetPrivateProfileStringW
GetPrivateProfileStringA
lstrcpynW
GetModuleHandleW
GetModuleFileNameW
GetModuleFileNameA
SystemTimeToFileTime
GetLocalTime
MapViewOfFile
GetFileType
SetFilePointer
SetEndOfFile
GetFileSize
ReadFile
WriteFile
FlushFileBuffers
WaitForSingleObject
CompareFileTime
SetThreadPriority
Sleep
GetLongPathNameA
GetLongPathNameW
ReleaseMutex
InterlockedExchange
GetStartupInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FindClose
IsValidLocale
SetErrorMode
FileTimeToSystemTime
lstrcatA
lstrcpyA
GetACP
DebugBreak
InterlockedCompareExchange
GetExitCodeThread
DeviceIoControl
GetVersion
HeapAlloc
GetDriveTypeW
GetDateFormatA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
lstrlenW
GetLastError
GetWindowsDirectoryA
GetProcAddress
SetLastError
CopyFileA
CopyFileW
CompareStringA
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateEventW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceA
FindResourceW
LocalFree
LocalAlloc
GetFileAttributesA
GetFileAttributesW
GetFileAttributesExA
GetFileAttributesExW
GetFullPathNameA
GetFullPathNameW
GetStartupInfoA
GetCommandLineA
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
VirtualAlloc
GetCurrentThread
GetOEMCP
user32
BeginPaint
GetClientRect
EndPaint
PostQuitMessage
DefWindowProcA
LoadCursorA
gdi32
PlayEnhMetaFile
DeleteEnhMetaFile
advapi32
RegOpenKeyW
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ