Static task
static1
Behavioral task
behavioral1
Sample
a197fb030b6941aaa83d834c8af9c9258d7192fe88962bcf49ce80f42f0b5aa3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a197fb030b6941aaa83d834c8af9c9258d7192fe88962bcf49ce80f42f0b5aa3.exe
Resource
win10v2004-20220812-en
General
-
Target
a197fb030b6941aaa83d834c8af9c9258d7192fe88962bcf49ce80f42f0b5aa3
-
Size
305KB
-
MD5
8453512f706809df8a1a420cc6792b0b
-
SHA1
1fbc6e39937109623948e5952adab592706c1030
-
SHA256
a197fb030b6941aaa83d834c8af9c9258d7192fe88962bcf49ce80f42f0b5aa3
-
SHA512
d78134e17899258ce14d22e84457bb92a05254aad292c0240a9cb6dc91a774f1c73da7f5c268ecf395edf3be60e99d6725cef111dca47bf17b55c8a313a950ed
-
SSDEEP
6144:PRS0S/WpKBlsEJgozcG+kN2tpzkiC+jg/cIhV3dF3oc8FuWCZXDp:PRSXWpKBl1gDMSg/cIhd4cwY
Malware Config
Signatures
Files
-
a197fb030b6941aaa83d834c8af9c9258d7192fe88962bcf49ce80f42f0b5aa3.exe windows x86
ef164bb47364627e96c72cbb7aaed046
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasW
HeapCreate
GetModuleHandleA
FindClose
GetDriveTypeW
SetEvent
ResumeThread
GetCurrentProcessId
lstrlenW
GetNumberFormatW
SetLastError
EnumCalendarInfoW
GetModuleFileNameA
EnterCriticalSection
LocalFree
TlsGetValue
FindAtomW
GetPrivateProfileStringW
GetCurrentThreadId
ReadFile
user32
IsWindow
DrawTextA
GetKeyboardType
GetMenuInfo
GetSysColor
GetCursorInfo
SetFocus
GetClientRect
GetClassInfoA
GetKeyState
DispatchMessageA
CallWindowProcW
DispatchMessageA
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ