Static task
static1
Behavioral task
behavioral1
Sample
53e02290df199c08d85d444406e32e5d4c6ebf9cc9c0e016cd7f3c5c607c352f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53e02290df199c08d85d444406e32e5d4c6ebf9cc9c0e016cd7f3c5c607c352f.exe
Resource
win10v2004-20221111-en
General
-
Target
53e02290df199c08d85d444406e32e5d4c6ebf9cc9c0e016cd7f3c5c607c352f
-
Size
23KB
-
MD5
1373ae893a0a3b3efaf6d550a39855d4
-
SHA1
c838207d5f353f382b96ceb7db53642a8334962c
-
SHA256
53e02290df199c08d85d444406e32e5d4c6ebf9cc9c0e016cd7f3c5c607c352f
-
SHA512
990efbccd3ee4d3a51207024c7d5196767e44b7edf49bd4987d10a03da07f586265f976034c522e68afa548563dde5a2dd18f191a7daee4c045c07c40370a572
-
SSDEEP
384:Cgg/b3pCvr0V0SGu3eJOs29Hc98g5b6taMfFXNIM5P60ez0mxSLTUYbowHMPmwQ:cFtJeCgr4tjhNr54TxgJs0
Malware Config
Signatures
Files
-
53e02290df199c08d85d444406e32e5d4c6ebf9cc9c0e016cd7f3c5c607c352f.exe windows x86
bc72942edbdb9b6ec85fd1b75a9b05cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
cmdial32
AutoDialFunc
kernel32
InitializeCriticalSection
GetCurrentThreadId
DisableThreadLibraryCalls
FatalAppExitA
LCMapStringA
VirtualAlloc
TerminateProcess
GetStartupInfoA
GetShortPathNameA
SetLastError
UnhandledExceptionFilter
FindResourceA
lstrcpynA
GetEnvironmentStrings
GetStringTypeW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
TlsGetValue
HeapReAlloc
GetModuleFileNameA
GetFileType
LoadLibraryExA
SetUnhandledExceptionFilter
IsDBCSLeadByte
IsBadCodePtr
MultiByteToWideChar
VirtualFree
InterlockedDecrement
GetACP
HeapFree
GetStdHandle
GetStringTypeA
lstrlenA
GetProcAddress
IsBadReadPtr
SetConsoleCtrlHandler
GetCommandLineA
SetHandleCount
SizeofResource
FreeLibrary
GetCurrentThread
GetModuleHandleA
GetOEMCP
LoadResource
EnterCriticalSection
LCMapStringW
DeleteCriticalSection
WideCharToMultiByte
GetLastError
HeapCreate
GetEnvironmentStringsW
GetVersion
GetCurrentProcess
InterlockedIncrement
WriteFile
LeaveCriticalSection
lstrcpyA
IsBadWritePtr
TlsAlloc
LoadLibraryA
GetCPInfo
RtlUnwind
lstrcatA
HeapAlloc
lstrcmpiA
TlsFree
lstrlenW
TlsSetValue
ExitProcess
HeapDestroy
adsnt
DllGetClassObject
dataclen
DllGetClassObject
Sections
.text Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE