Static task
static1
Behavioral task
behavioral1
Sample
a1a175f444738210831e113b0252124785bbb1293fd196c162045d8a6597d806.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1a175f444738210831e113b0252124785bbb1293fd196c162045d8a6597d806.exe
Resource
win10v2004-20220812-en
General
-
Target
a1a175f444738210831e113b0252124785bbb1293fd196c162045d8a6597d806
-
Size
112KB
-
MD5
b0e13ca041234114a081290147323124
-
SHA1
d533580a0d32e280d8896ca61ee340fffd63ecfd
-
SHA256
a1a175f444738210831e113b0252124785bbb1293fd196c162045d8a6597d806
-
SHA512
088320c2d5b47300cca631af6543bff0c08150f1a76d21ed42ffa6b44e55dbc2ced517e2acc4193becf67763c941f6aefafdd6370d943e11bedb644e48d2c4cc
-
SSDEEP
1536:/4+V3RhNnE+P7DxisxAQC1pq4D8znfBeR/yi8ME6Awuj9WJnpqqmvyEVcup:/4+jFos+71pq4DGnfBePvAw3A93cc
Malware Config
Signatures
Files
-
a1a175f444738210831e113b0252124785bbb1293fd196c162045d8a6597d806.exe windows x86
41ea4986a38bbc4cc17eb9ed6aa8ce6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleOutputCharacterA
GetProcAddress
GetThreadLocale
ExitProcess
GetCurrentProcess
EscapeCommFunction
FatalExit
SetFirmwareEnvironmentVariableA
VirtualAllocEx
GetCommandLineW
GetPrivateProfileSectionNamesW
SetCurrentDirectoryA
OpenMutexA
user32
GetWindowRgnBox
CopyAcceleratorTableA
SetMessageQueue
SetDlgItemInt
InvalidateRgn
ExitWindowsEx
InvalidateRect
LoadBitmapW
ChangeDisplaySettingsExA
GetFocus
EnumPropsExW
LockWindowUpdate
gdi32
SetBoundsRect
PolyTextOutA
Sections
.text Size: 100KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.textbbs Size: - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ