Static task
static1
Behavioral task
behavioral1
Sample
a5b58c3065725204fdad474dfb83d58be2765501854f21c321fd181c8ca0e4a5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5b58c3065725204fdad474dfb83d58be2765501854f21c321fd181c8ca0e4a5.exe
Resource
win10v2004-20220812-en
General
-
Target
a5b58c3065725204fdad474dfb83d58be2765501854f21c321fd181c8ca0e4a5
-
Size
109KB
-
MD5
a50892013eafa0cbcfe7f54feb1f5dfd
-
SHA1
84578e20b425a0b4675adce4c4a92c7899a4592d
-
SHA256
a5b58c3065725204fdad474dfb83d58be2765501854f21c321fd181c8ca0e4a5
-
SHA512
86ad7a205ece78bed92eaf64ee75fb84f3706a6f4c533b4cf01737b85842c21302a947ebeaa0cc3eb5de72c1ccf643f1e0eefd2a358ad0babd44da24b676dcd1
-
SSDEEP
3072:wm+RVZoRMXEEs+O/70STXfb3g/z7naMpI:WRVKRbEs+IXfb3g/3ak
Malware Config
Signatures
Files
-
a5b58c3065725204fdad474dfb83d58be2765501854f21c321fd181c8ca0e4a5.exe windows x86
2e241f960cde84ffaa92ed22ed538c59
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
MoveFileA
DuplicateHandle
CopyFileA
DeleteFileA
VirtualProtect
VirtualFree
CopyFileW
GetSystemTimeAsFileTime
SetStdHandle
FileTimeToDosDateTime
LocalAlloc
lstrcpyA
SetFileAttributesA
GetVersionExA
GetDriveTypeA
GetUserDefaultLangID
GetConsoleOutputCP
lstrcatA
GetACP
CompareFileTime
GetModuleHandleA
MultiByteToWideChar
SetLastError
LoadResource
GetOEMCP
IsDebuggerPresent
CompareStringA
GetCurrentProcess
GetThreadLocale
RtlUnwind
GetModuleFileNameW
GlobalUnlock
GetFileAttributesA
EnumCalendarInfoA
lstrcmpiW
GetExitCodeProcess
RemoveDirectoryA
GetTempPathA
lstrcmpiA
CreateProcessA
GetVersion
GetCommandLineA
MulDiv
IsValidCodePage
GlobalAlloc
GetCommandLineW
GetModuleHandleW
GetWindowsDirectoryA
FileTimeToLocalFileTime
GetUserDefaultLCID
GetCurrentProcessId
msvcrt
__set_app_type
__p__commode
_exit
__p__fmode
__setusermatherr
_adjust_fdiv
_except_handler3
_XcptFilter
_controlfp
__getmainargs
_initterm
__p___initenv
user32
IsWindow
GetDlgItem
WaitMessage
EnableWindow
PtInRect
DispatchMessageA
IntersectRect
GetCapture
EndDialog
GetMenuItemID
DrawMenuBar
RemoveMenu
GetDesktopWindow
IsRectEmpty
RedrawWindow
SendMessageA
KillTimer
ShowOwnedPopups
DestroyCursor
LoadCursorA
SetCursor
SendDlgItemMessageA
EmptyClipboard
DrawIcon
GetSystemMetrics
GetWindowPlacement
GetActiveWindow
IsChild
WindowFromPoint
SetWindowsHookExA
GetMessageA
ShowCursor
ClientToScreen
SetWindowPlacement
InsertMenuA
ReleaseCapture
TrackPopupMenu
LoadStringA
SetScrollPos
EnableMenuItem
FindWindowA
SetMenu
GetWindowLongA
advapi32
DeregisterEventSource
RegQueryInfoKeyW
GetUserNameA
RegOpenKeyW
AdjustTokenPrivileges
RegCloseKey
OpenSCManagerW
RegDeleteKeyA
RegCreateKeyA
OpenSCManagerA
AddAccessAllowedAce
InitiateSystemShutdownA
SetSecurityDescriptorOwner
OpenServiceW
FreeSid
RegSetValueExA
CloseServiceHandle
SetSecurityDescriptorDacl
GetTokenInformation
RegFlushKey
CopySid
OpenServiceA
RegQueryInfoKeyA
OpenThreadToken
GetLengthSid
RegEnumKeyW
CryptReleaseContext
RegQueryValueExA
CryptCreateHash
CryptAcquireContextA
QueryServiceStatus
Sections
.text Size: 1024B - Virtual size: 844B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ