Static task
static1
Behavioral task
behavioral1
Sample
a4e16f8b55729e9d414785db97d9b8d29199c9cb5de398c878533fc4b8213894.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4e16f8b55729e9d414785db97d9b8d29199c9cb5de398c878533fc4b8213894.exe
Resource
win10v2004-20221111-en
General
-
Target
a4e16f8b55729e9d414785db97d9b8d29199c9cb5de398c878533fc4b8213894
-
Size
305KB
-
MD5
5908aee8151edf56cbeb501d684666bc
-
SHA1
01a68cf8ee785f1dae81d91b3c2f4064bd9c2c9c
-
SHA256
a4e16f8b55729e9d414785db97d9b8d29199c9cb5de398c878533fc4b8213894
-
SHA512
b3d1bed12a3f26aadf5d84b3ea544dd7675540055aa22241552c956c83690af349b8c98dc4feb5815cac5d69713c0c332534d3ae8899c9e598ab6a3c21353631
-
SSDEEP
6144:AfKPV+iP7D5GqQ9ZFIEuxcolb8gzOqlNnWxA4JD/Twg/qMx:AyPVNP/5G97188gRr+LTwg/qMx
Malware Config
Signatures
Files
-
a4e16f8b55729e9d414785db97d9b8d29199c9cb5de398c878533fc4b8213894.exe windows x86
58ec2000390e43d02547d9deb5a4d469
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
HeapSize
GetFileSize
FindClose
GetEnvironmentVariableA
HeapDestroy
GetProfileIntW
ReleaseMutex
DeleteFileA
HeapCreate
CloseHandle
GetTickCount
AddAtomA
GetCurrentDirectoryA
SuspendThread
WaitForSingleObject
CreateMutexW
GetTickCount
ExitProcess
SetLastError
SetEndOfFile
GetModuleHandleA
GetStartupInfoW
ResetEvent
InitializeCriticalSection
shell32
SHFree
StrChrA
DllUnregisterServer
ShellAboutA
DuplicateIcon
SHGetMalloc
ShellMessageBoxA
DragAcceptFiles
DragQueryFileA
ExtractIconA
SHGetDiskFreeSpaceA
DragFinish
SHGetSettings
dpmodemx
SPInit
SPInit
SPInit
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ