Static task
static1
Behavioral task
behavioral1
Sample
a10364ce84a2578925443c74b9203e7bfb956f6970b33f3543222b8a8017e711.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a10364ce84a2578925443c74b9203e7bfb956f6970b33f3543222b8a8017e711.exe
Resource
win10v2004-20220812-en
General
-
Target
a10364ce84a2578925443c74b9203e7bfb956f6970b33f3543222b8a8017e711
-
Size
276KB
-
MD5
eb8925b8bbb09499827b88875b4ecaf4
-
SHA1
f344b5b381f5377378e08a9efa8b9717752114e6
-
SHA256
a10364ce84a2578925443c74b9203e7bfb956f6970b33f3543222b8a8017e711
-
SHA512
12c8fcc7d64ea603146f613fa28864d0029d55d971fdecbf8b4907f1e8c856ee2d8d15844919ec984f3fafc205ce20860dc65148d56c880233fa7c1e47c30e91
-
SSDEEP
6144:lJikOAMNBCywiYe44yQKgzpfWEA/qxP2VeH5WnWD8U:lULAeQ3V4Wgz5WEI9UZVD
Malware Config
Signatures
Files
-
a10364ce84a2578925443c74b9203e7bfb956f6970b33f3543222b8a8017e711.exe windows x86
03079911194e17d8a17e4ec2a32c0492
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleInputA
FatalExit
DeleteTimerQueueEx
RequestWakeupLatency
GetDiskFreeSpaceA
ResetEvent
InitAtomTable
QueueUserAPC
GlobalHandle
SetCommTimeouts
UnlockFile
GetCommModemStatus
SetWaitableTimer
OpenSemaphoreA
SetConsoleTextAttribute
FindNextChangeNotification
AllocConsole
ResumeThread
SignalObjectAndWait
GetProcessWorkingSetSize
RemoveDirectoryA
GetThreadPriority
OpenWaitableTimerA
SetThreadContext
QueryPerformanceFrequency
SuspendThread
GetFullPathNameA
GetConsoleTitleA
VirtualAlloc
OpenThread
IsDebuggerPresent
GetThreadPriorityBoost
UnregisterWait
DeleteTimerQueue
LoadLibraryExA
IsProcessorFeaturePresent
SetVolumeLabelA
GetProcessHeaps
ConnectNamedPipe
ClearCommBreak
SetThreadLocale
SetEndOfFile
WriteFile
FindFirstFileA
SetFirmwareEnvironmentVariableA
RemoveDirectoryA
FlushViewOfFile
SetLocalPrimaryComputerNameA
GetCurrentProcess
ReplaceFile
GetCurrencyFormatA
GetVolumePathNameA
SetFileApisToOEM
IsValidCodePage
user32
CharLowerBuffW
CreateIconFromResource
UnregisterClassA
ImpersonateDdeClientWindow
GetInternalWindowPos
UnregisterHotKey
GetRawInputDeviceList
SetSystemCursor
RegisterClassExA
GetMenuItemCount
DlgDirSelectExA
LoadKeyboardLayoutEx
BroadcastSystemMessageExW
GetMessageA
IsZoomed
CharToOemBuffA
GetRawInputData
ShowStartGlass
OemKeyScan
OpenClipboard
GetMessageA
SendIMEMessageExA
SystemParametersInfoA
SetPropA
EnumWindowStationsA
IsDlgButtonChecked
opengl32
glAlphaFunc
ddraw
DirectDrawCreate
shell32
DragAcceptFiles
DragFinish
Sections
CODE Size: 267KB - Virtual size: 267KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE