Static task
static1
Behavioral task
behavioral1
Sample
a018aeb301ceb10d761fd13402551053a44f2fefbfcfeb56d3d6f9d04c6a979f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a018aeb301ceb10d761fd13402551053a44f2fefbfcfeb56d3d6f9d04c6a979f.exe
Resource
win10v2004-20221111-en
General
-
Target
a018aeb301ceb10d761fd13402551053a44f2fefbfcfeb56d3d6f9d04c6a979f
-
Size
127KB
-
MD5
1e5bb66174441a1fd0a53c9d4fc71b7d
-
SHA1
b91b892ec9be1daae09e78962d9eccf104cba1e5
-
SHA256
a018aeb301ceb10d761fd13402551053a44f2fefbfcfeb56d3d6f9d04c6a979f
-
SHA512
65e465d32c322809609757287204d973523bfeb1cb44a3d01ebb3887b537990cf027caa56f8ebe3847de5ee69ca1f4f1d41ebd7d138420b562192bcebe5a8f3b
-
SSDEEP
3072:YSPQQfrWnxuXEd7RMsNhttTOdb9ryRs34yo:tP1fAxuuiQPAdb9B
Malware Config
Signatures
Files
-
a018aeb301ceb10d761fd13402551053a44f2fefbfcfeb56d3d6f9d04c6a979f.exe windows x86
68e49f9e0a9a27eac81ce55f516719e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
OpenSemaphoreA
GetProfileSectionA
GetProcAddress
GetLongPathNameA
GlobalWire
CreateConsoleScreenBuffer
DisconnectNamedPipe
GetFileAttributesA
GetTickCount
CreateFileMappingA
DefineDosDeviceA
WriteFile
HeapDestroy
CommConfigDialogA
LoadResource
GetThreadSelectorEntry
IsSystemResumeAutomatic
MulDiv
IsDebuggerPresent
GetCommMask
GlobalCompact
SizeofResource
AddAtomA
MultiByteToWideChar
ClearCommError
FreeResource
GlobalFlags
GetThreadContext
CreateEventA
FreeLibrary
HeapCreate
CopyFileExA
WaitForSingleObject
GetProcessHeap
HeapAlloc
GetStdHandle
OpenFileMappingA
FlushViewOfFile
PulseEvent
DeleteFileA
WaitForMultipleObjects
CreateSemaphoreA
VirtualFreeEx
FindResourceExA
GetProcessTimes
GlobalLock
MoveFileA
ContinueDebugEvent
GetUserDefaultLCID
FlushInstructionCache
CreateMailslotA
GetPrivateProfileSectionA
HeapReAlloc
WritePrivateProfileStringA
FormatMessageA
AllocConsole
CreateIoCompletionPort
CreateFiber
IsBadHugeWritePtr
SetFileTime
CreateDirectoryA
MoveFileExA
GetSystemDefaultUILanguage
GetLocalTime
QueueUserAPC
BeginUpdateResourceA
GetMailslotInfo
GetLogicalDriveStringsA
LocalCompact
GetCommModemStatus
GetSystemDefaultLCID
OpenEventA
GetCPInfo
GetEnvironmentStrings
GlobalAlloc
WaitNamedPipeA
FindCloseChangeNotification
GetOEMCP
IsBadReadPtr
FlushFileBuffers
GlobalSize
UnlockFile
SearchPathA
EraseTape
GetFileTime
IsBadCodePtr
HeapValidate
GetFileInformationByHandle
GetProfileStringA
CancelIo
LocalFree
GetCommConfig
GetSystemDirectoryA
VirtualFree
DuplicateHandle
GetThreadLocale
IsProcessorFeaturePresent
QueryDosDeviceA
LocalHandle
GetLargestConsoleWindowSize
GetHandleInformation
FindAtomA
GetCurrentThreadId
ResetEvent
QueryPerformanceCounter
CreateRemoteThread
SetLastError
VirtualQueryEx
VirtualUnlock
InitAtomTable
EndUpdateResourceA
DeviceIoControl
VirtualAllocEx
GetPrivateProfileSectionNamesA
ConnectNamedPipe
CancelWaitableTimer
VirtualAlloc
GetCurrentProcess
WriteProfileStringA
GetPrivateProfileStructA
GetProcessAffinityMask
GetExitCodeThread
LocalReAlloc
FreeConsole
GetCPInfoExA
DosDateTimeToFileTime
RemoveDirectoryA
Beep
WaitForSingleObjectEx
LockFile
GetModuleHandleA
GetUserDefaultUILanguage
GetTempPathA
GetProcessHeaps
GlobalHandle
GetWindowsDirectoryA
UnmapViewOfFile
GetDriveTypeA
ReadProcessMemory
GetProcessWorkingSetSize
FindFirstChangeNotificationA
GetCommTimeouts
SetEvent
CloseHandle
LoadLibraryExA
GetCommandLineA
GetStartupInfoA
msvcrt
srand
time
rand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE