Static task
static1
Behavioral task
behavioral1
Sample
ad47244e61b837ebeab4066c1d3413f66082a938f3f0937dddda7c2955374196.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad47244e61b837ebeab4066c1d3413f66082a938f3f0937dddda7c2955374196.exe
Resource
win10v2004-20220812-en
General
-
Target
ad47244e61b837ebeab4066c1d3413f66082a938f3f0937dddda7c2955374196
-
Size
58KB
-
MD5
5a2b13aa6f7674a25983c7b53bf31b02
-
SHA1
4a7d8f7e2fa173dcab4a61284ac445002a0bb209
-
SHA256
ad47244e61b837ebeab4066c1d3413f66082a938f3f0937dddda7c2955374196
-
SHA512
a05bc5f2af26d9d7e62e30a8704ff7a9a5d6d60cafc3303bcc21bd6f01e5511d32100323c34e70773725ed6c171f8e76d9ccfc281a5e255ef0140304ab1f2cab
-
SSDEEP
768:cKxi/Ab0pln59x0X/nquVpEaAm/oWpAqzgDWGg1tA2qfekhIAJ5oKSHxIN25FqmU:nGpTs73npAqzgiH3kt5pSHxN5YmU
Malware Config
Signatures
Files
-
ad47244e61b837ebeab4066c1d3413f66082a938f3f0937dddda7c2955374196.exe windows x86
29e4eda5d130dcb10c14e7a2ac98fa63
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetTokenInformation
GetUserNameA
InitializeSecurityDescriptor
LookupAccountSidA
OpenSCManagerA
QueryServiceStatus
RegOpenKeyExA
RegQueryInfoKeyA
UnlockServiceDatabase
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateToolhelp32Snapshot
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindFirstFileA
FindResourceA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetConsoleOutputCP
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatA
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalFree
GlobalLock
GlobalUnlock
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedExchange
IsBadCodePtr
IsValidCodePage
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
Module32First
MoveFileA
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ReadProcessMemory
RemoveDirectoryA
ResumeThread
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFileAttributesA
SetFileTime
Sleep
SuspendThread
TerminateProcess
TlsFree
TlsGetValue
UnhandledExceptionFilter
VirtualAlloc
WritePrivateProfileStringA
lstrcmpiA
user32
CallNextHookEx
CharPrevA
CharUpperA
CheckDlgButton
CreateDialogParamA
DispatchMessageA
DrawTextA
FindWindowA
GetDC
GetMessageA
GetMessagePos
GetSysColorBrush
GetSystemMetrics
GetWindowDC
GetWindowRect
GetWindowTextA
LoadIconA
MessageBeep
MessageBoxA
MsgWaitForMultipleObjects
PostQuitMessage
PtInRect
SetFocus
SetTimer
SetWindowLongA
SetWindowRgn
TranslateMessage
UnregisterClassA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 18KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ