Static task
static1
Behavioral task
behavioral1
Sample
5a2c55145a40e567be1391ecace9d7916cb526b6b68e20c311d05e49eda3a389.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5a2c55145a40e567be1391ecace9d7916cb526b6b68e20c311d05e49eda3a389.exe
Resource
win10v2004-20221111-en
General
-
Target
5a2c55145a40e567be1391ecace9d7916cb526b6b68e20c311d05e49eda3a389
-
Size
393KB
-
MD5
33dcc7209d54b87f14adb0a94205277f
-
SHA1
1616a508dc844678ba0ef3b51f672ecee23c8310
-
SHA256
5a2c55145a40e567be1391ecace9d7916cb526b6b68e20c311d05e49eda3a389
-
SHA512
8efdcde8d7c526e80d7a5e0cdaedfe1d3f435418affae082d9a0455eb6502034c81ebd179a363e3a9e5a45bd1c98cdd6cdb6affe847b2b10a2a6fd4ba8d4d607
-
SSDEEP
6144:6HVUeNULfjGQXr8sQwJ8RdCCKoryzWz0cSxhIC/aulYcJeNsrFS/Zt3Zu7Ea6zv2:ivULyjQorymC/aWYuosit3ZaEa6zV0T
Malware Config
Signatures
Files
-
5a2c55145a40e567be1391ecace9d7916cb526b6b68e20c311d05e49eda3a389.exe windows x86
d77934392a9b0f485b44c25c8ec7698a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LocalFree
LocalLock
GetConsoleAliasW
FreeEnvironmentStringsA
CreateFileA
GetCalendarInfoA
WaitForMultipleObjects
GlobalUnlock
TlsGetValue
GetACP
CloseHandle
Sleep
LoadLibraryExA
GetConsoleCP
HeapCreate
FindClose
CreateFileMappingA
FindAtomA
GetLastError
user32
DefWindowProcW
DispatchMessageA
CheckRadioButton
SetFocus
FillRect
DrawTextA
GetIconInfo
GetDC
DrawEdge
CallWindowProcA
CopyRect
IsWindow
GetDlgItem
MessageBoxA
setupapi
CM_Add_IDA
SetupCloseInfFile
CMP_Report_LogOn
SetupCloseLog
CM_Add_Range
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ