Static task
static1
Behavioral task
behavioral1
Sample
a97b8fb351547b3d46c8ba08b3394fdc01ae1a236f7977ea9fd2ba485217b043.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a97b8fb351547b3d46c8ba08b3394fdc01ae1a236f7977ea9fd2ba485217b043.exe
Resource
win10v2004-20220812-en
General
-
Target
a97b8fb351547b3d46c8ba08b3394fdc01ae1a236f7977ea9fd2ba485217b043
-
Size
342KB
-
MD5
ea607805a2175ba6c3090b6d9df0c95e
-
SHA1
040f60d448c16966cc04c066a115f6632759c7be
-
SHA256
a97b8fb351547b3d46c8ba08b3394fdc01ae1a236f7977ea9fd2ba485217b043
-
SHA512
152145404ef92b13f618477e64309bd2fe823952f93d39d42eb91773aba571978ed6fb4de4f44284b743d21a3da982fd4680ab3711af14b34ae1c7d81171eaee
-
SSDEEP
6144:stf9h2S9Beu7vLKU5m0+iiZHJoa5qT0Ag6oFFRBGnGCRxX6CSklCDK:U9EyBe2Y0+iiZpJNANCFRBGGcl6CSkwe
Malware Config
Signatures
Files
-
a97b8fb351547b3d46c8ba08b3394fdc01ae1a236f7977ea9fd2ba485217b043.exe windows x86
c342eaebd88b28558bdfd598074903d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetConsoleCP
GetPrivateProfileIntA
GetACP
CreateFileMappingA
GetLastError
LoadLibraryExA
LocalFree
FindClose
CreateEventA
GetStdHandle
HeapCreate
IsDebuggerPresent
lstrlenA
CloseHandle
FreeEnvironmentStringsA
IsBadReadPtr
GetModuleHandleA
GlobalUnlock
GlobalLock
user32
GetListBoxInfo
GetDlgItem
CheckMenuItem
RedrawWindow
DialogBoxParamA
GetDC
GetDlgItemTextA
GetIconInfo
SetFocus
DispatchMessageA
EndDialog
GetMessageA
IsWindow
DrawIconEx
uxtheme
GetThemeMetric
CloseThemeData
DrawThemeIcon
GetThemeColor
EnableTheming
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ