Static task
static1
Behavioral task
behavioral1
Sample
ad1033b9356037c50c6e1dd0eab4a4ed3d9934bd185bd660c4d2c24e6c3f1a7b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad1033b9356037c50c6e1dd0eab4a4ed3d9934bd185bd660c4d2c24e6c3f1a7b.exe
Resource
win10v2004-20220812-en
General
-
Target
ad1033b9356037c50c6e1dd0eab4a4ed3d9934bd185bd660c4d2c24e6c3f1a7b
-
Size
171KB
-
MD5
67e8d616dd0a615f8daefaca82558b4d
-
SHA1
10a9dee16e3799f8352aab62fd8209d3b8c3c894
-
SHA256
ad1033b9356037c50c6e1dd0eab4a4ed3d9934bd185bd660c4d2c24e6c3f1a7b
-
SHA512
143401f5691ee1838ccf69d24ef4fdaef0314a7f02be6ec86d06be584d41e4565bcdbd8d760ed52f9b89d2670bb4e1eb3955a7fc28ce769a26288da5743fd987
-
SSDEEP
3072:5H8Kiu5kUUMI/fWQRKRuxwz9YQKtwSJQXDqvCBn2X2OFFl3zk720ocJJ7b:5H8Kiu5IM/huxGY/JQTsC92X2aTzkjJ/
Malware Config
Signatures
Files
-
ad1033b9356037c50c6e1dd0eab4a4ed3d9934bd185bd660c4d2c24e6c3f1a7b.exe windows x86
6d81701e84b46dfd5f109ffbb887642a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumSystemLocalesA
FindNextChangeNotification
FreeEnvironmentStringsW
SetFilePointerEx
VirtualAlloc
CreateMutexA
WritePrivateProfileStringW
CreateWaitableTimerW
CreateMutexW
CreatePipe
FindNextVolumeMountPointA
GetConsoleOutputCP
_hread
GetModuleHandleA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
ReadFile
SetEndOfFile
LoadLibraryA
GetProcAddress
HeapReAlloc
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetLastError
GetFileAttributesA
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
CloseHandle
CreateFileA
HeapAlloc
MultiByteToWideChar
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
LCMapStringA
LCMapStringW
SetEnvironmentVariableA
user32
SetWindowsHookA
DrawTextA
FindWindowA
EmptyClipboard
DdeReconnect
PackDDElParam
RegisterClipboardFormatA
DefWindowProcW
TileChildWindows
GetScrollPos
TranslateAcceleratorW
CallMsgFilterW
MessageBoxA
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE