Static task
static1
Behavioral task
behavioral1
Sample
ad648bafc1062076af31aa9f197a7107152402a00427269733b3216f82325ff6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad648bafc1062076af31aa9f197a7107152402a00427269733b3216f82325ff6.exe
Resource
win10v2004-20220812-en
General
-
Target
ad648bafc1062076af31aa9f197a7107152402a00427269733b3216f82325ff6
-
Size
305KB
-
MD5
43d0121b14a2e1eb532b1e4a6d5317ef
-
SHA1
988c04d611ef0b70d5c283e94a77f0f89a3d5e63
-
SHA256
ad648bafc1062076af31aa9f197a7107152402a00427269733b3216f82325ff6
-
SHA512
1362d2d44c99d551fad3682142dbab1e46ab43f0b5ffc81ccd06685c05b0b5813366a39e7b6dd1b4075488d2067d4ae890a121b69842d1ad831975082ca22797
-
SSDEEP
6144:JpIrbxg8AHfkvBDOB7XUYucrmAypQKMssUMbYbqzlNa+:n+xg8QiDx0rmAyWssUMbYbqZ
Malware Config
Signatures
Files
-
ad648bafc1062076af31aa9f197a7107152402a00427269733b3216f82325ff6.exe windows x86
91d12c48dd702e36a5773f3a205956ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetCurrentThreadId
GetModuleHandleA
SetLastError
GetCurrentProcessId
FindClose
LocalFree
ResumeThread
lstrlenW
GetConsoleAliasA
TlsGetValue
ReadFile
GetPrivateProfileStringA
HeapCreate
CreateEventW
FindAtomW
GetDriveTypeW
GetNumberFormatW
EnumCalendarInfoA
GlobalFlags
user32
GetSysColor
DispatchMessageA
GetKeyboardType
CallWindowProcW
GetClassInfoA
GetCursorInfo
DispatchMessageA
GetClientRect
IsWindow
SetFocus
GetMenuInfo
DrawTextA
GetKeyState
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
dsprop
CheckADsError
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ