Static task
static1
Behavioral task
behavioral1
Sample
a15e58b584cdbcc6bee7ebac749e4f4393a774ae1158998a0f7ce785dc075b8d.exe
Resource
win7-20220812-en
General
-
Target
a15e58b584cdbcc6bee7ebac749e4f4393a774ae1158998a0f7ce785dc075b8d
-
Size
96KB
-
MD5
1a208710deea9a7b178f4cdda89da8a0
-
SHA1
a42f3432598fd9762c3cba43076190eab2d9735c
-
SHA256
a15e58b584cdbcc6bee7ebac749e4f4393a774ae1158998a0f7ce785dc075b8d
-
SHA512
3d2b6ba130251c231eaf78535373370bce0d2de41028aee2eac0e8d4969982d488622895b9a05e8ed6a85be48e0b201b1682ba8d4dd55635f365f3c739f52895
-
SSDEEP
768:CE5yf3fzoR/wno0wRmrVerR1lfZrVGs7bWzO4DjJuMtLrl:Z5ePcR/co0wkVe91pZrVGs7izO4J/drl
Malware Config
Signatures
Files
-
a15e58b584cdbcc6bee7ebac749e4f4393a774ae1158998a0f7ce785dc075b8d.exe windows x86
86842069ef527f3c796ebd97e99eb984
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
kernel32
WaitForSingleObject
CreateThread
lstrcatA
GetLastError
CreateMutexA
lstrcmpA
lstrcpyA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetCommandLineA
WriteProcessMemory
lstrlenW
ExitProcess
Sleep
ReadProcessMemory
GetModuleHandleA
GetCurrentProcess
IsDebuggerPresent
lstrcmpiA
AllocConsole
CloseHandle
HeapFree
GetEnvironmentVariableA
HeapAlloc
GetStartupInfoA
GetProcessHeap
lstrlenA
GetModuleFileNameW
user32
IsWindow
UpdateWindow
InsertMenuA
MessageBoxW
MessageBoxA
CallWindowProcA
TrackPopupMenu
PostQuitMessage
gdi32
RealizePalette
BitBlt
SelectObject
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 77KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE