Static task
static1
Behavioral task
behavioral1
Sample
a736f9aab9a19b48c0167183ba51fef9b7adf19cc9a71b3a5c5a30996508a5da.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a736f9aab9a19b48c0167183ba51fef9b7adf19cc9a71b3a5c5a30996508a5da.exe
Resource
win10v2004-20220812-en
General
-
Target
a736f9aab9a19b48c0167183ba51fef9b7adf19cc9a71b3a5c5a30996508a5da
-
Size
92KB
-
MD5
480c22ba643430aad8336ed74e066046
-
SHA1
4d8cf2c240989271d0d845eff7b9e050d35c4c86
-
SHA256
a736f9aab9a19b48c0167183ba51fef9b7adf19cc9a71b3a5c5a30996508a5da
-
SHA512
ef146034463bea636e329c9397283bc210b587a72e4c502b7830179583cb29992170d6bb55ec981029414ce4fe50f9b59069581ee048862ff7b47c2f22fa4b72
-
SSDEEP
1536:vbf/NANavMB95DvNdRVsa6EPQRJ4GFUsboCpUoii1D:vj/CNiSvNdR1gFFUsboCEi1D
Malware Config
Signatures
Files
-
a736f9aab9a19b48c0167183ba51fef9b7adf19cc9a71b3a5c5a30996508a5da.exe windows x86
e2818e5e0b6b7e4685228f35fca8454a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindNextFileA
lstrcmpiA
FindFirstFileA
SetFilePointer
GetFileSize
ReadFile
GetLastError
Beep
GetDriveTypeA
GetLogicalDriveStringsA
CopyFileA
GetVolumeInformationA
SetErrorMode
lstrcmpA
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GlobalLock
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetVersion
GetCommandLineA
GetStartupInfoA
GlobalUnlock
ExitThread
CreateProcessA
WaitForSingleObject
GetLocalTime
DeleteFileA
GetEnvironmentVariableA
ExitProcess
GetModuleFileNameA
MultiByteToWideChar
CreateDirectoryA
CreateFileA
WriteFile
CloseHandle
Sleep
CreateThread
GetTickCount
lstrlenA
GetCPInfo
GetModuleHandleA
HeapAlloc
HeapFree
GetStringTypeW
user32
GetClassNameA
GetWindowTextA
GetForegroundWindow
MessageBoxA
RegisterClassA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
DefWindowProcA
EnumWindows
CloseClipboard
GetClipboardData
OpenClipboard
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
DispatchMessageA
TranslateMessage
GetMessageA
EnumChildWindows
SendMessageA
PostQuitMessage
GetKeyboardLayout
CallNextHookEx
GetWindowThreadProcessId
GetKeyState
EmptyClipboard
gdi32
CreateCompatibleDC
GetDeviceCaps
CreateDIBSection
DeleteDC
SaveDC
SelectObject
BitBlt
RestoreDC
DeleteObject
CreateDCA
advapi32
RegOpenKeyA
RegSetValueExA
RegCloseKey
shell32
ShellExecuteA
oleaut32
SysAllocStringLen
SysFreeString
ws2_32
recv
closesocket
connect
htons
gethostbyname
socket
WSACleanup
WSAStartup
send
gdiplus
GdipSaveImageToFile
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
GdiplusStartup
GdipFree
GdipDisposeImage
GdipCloneImage
GdipAlloc
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ