Static task
static1
Behavioral task
behavioral1
Sample
a88a19746b7fef9810136ec20c78a177cdabb3219a79bda43b2ffca8ece8ade4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a88a19746b7fef9810136ec20c78a177cdabb3219a79bda43b2ffca8ece8ade4.exe
Resource
win10v2004-20221111-en
General
-
Target
a88a19746b7fef9810136ec20c78a177cdabb3219a79bda43b2ffca8ece8ade4
-
Size
355KB
-
MD5
f01d731d1c3f972a7569c4566dcd0a15
-
SHA1
650f7e0e3f396f637371c83a49c4623ec8336a72
-
SHA256
a88a19746b7fef9810136ec20c78a177cdabb3219a79bda43b2ffca8ece8ade4
-
SHA512
54f384b04d26120ca29566cc209d6a0cb01809d9cd0515b850a9bb0647ac0fa2fc1e08be7c2df6bb5a5120930b6864c22f8ebe2a2c0106971303d736d9649970
-
SSDEEP
6144:9Y2HxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVV2+:9Y2R9QI0Ay6fYvzEOe2KNSQ6l83zBzsb
Malware Config
Signatures
Files
-
a88a19746b7fef9810136ec20c78a177cdabb3219a79bda43b2ffca8ece8ade4.exe windows x86
03807c5a678314cae9c218f9873919f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
ResetEvent
ResumeThread
GetTickCount
GetDiskFreeSpaceW
FindAtomW
VirtualAlloc
GetFileAttributesA
GetSystemTime
GetModuleHandleW
GetPrivateProfileIntA
ExitProcess
GetTickCount
GetComputerNameW
GetCommandLineW
lstrlenA
CloseHandle
SuspendThread
CreateFileA
LocalFree
user32
GetClassInfoA
CloseWindow
FillRect
GetMenu
CallWindowProcA
CreateWindowExA
GetDlgItem
DispatchMessageA
EndDialog
GetClientRect
GetCaretPos
DrawStateA
DestroyCaret
rasapi32
DwCloneEntry
DwRasUninitialize
DwEnumEntryDetails
RasDeleteEntryA
RasDialA
adsnt
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ