Static task
static1
Behavioral task
behavioral1
Sample
a54229a010c1fed97a96b9cb0e033f71212bb4d072a18210346983e70c77ba78.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a54229a010c1fed97a96b9cb0e033f71212bb4d072a18210346983e70c77ba78.exe
Resource
win10v2004-20221111-en
General
-
Target
a54229a010c1fed97a96b9cb0e033f71212bb4d072a18210346983e70c77ba78
-
Size
355KB
-
MD5
a1793765a7ce5c937c4f7822c78e272c
-
SHA1
280b86f28e249f7ad2c7072571483ea6853d8b6d
-
SHA256
a54229a010c1fed97a96b9cb0e033f71212bb4d072a18210346983e70c77ba78
-
SHA512
4b0a337d6f5cb2b5921aa1f5cb4ebe87172aba7f916c976290251653ba8b4c7cbfe69429fb3b420989a471c6b3787d0755c03419b14730b78343fa9ae5feb1df
-
SSDEEP
6144:bykHxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVV2+:bykR9QI0Ay6fYvzEOe2KNSQ6l83zBzsb
Malware Config
Signatures
Files
-
a54229a010c1fed97a96b9cb0e033f71212bb4d072a18210346983e70c77ba78.exe windows x86
abe58c12e5f01b37279b89ebb132324b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetCommandLineW
LoadLibraryA
CreateFileA
VirtualAlloc
GetComputerNameW
ExitProcess
GetSystemTime
FindAtomW
lstrlenA
LocalFree
GetDiskFreeSpaceW
ReleaseMutex
GetDriveTypeW
ResetEvent
GetTickCount
GetTickCount
ReleaseMutex
GetModuleHandleW
CloseHandle
user32
FillRect
GetClientRect
DispatchMessageA
EndDialog
GetDlgItem
GetClassInfoA
CallWindowProcA
DrawStateA
GetMenu
DestroyCaret
CloseWindow
CreateWindowExA
GetCaretPos
rasapi32
DwRasUninitialize
DwEnumEntryDetails
RasDialA
DwCloneEntry
RasDeleteEntryA
adsnt
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ