Static task
static1
Behavioral task
behavioral1
Sample
a10e526dc64405ae369c0b2cd0c795acae105250ac6d9896e86e8e39bcd089d6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a10e526dc64405ae369c0b2cd0c795acae105250ac6d9896e86e8e39bcd089d6.exe
Resource
win10v2004-20221111-en
General
-
Target
a10e526dc64405ae369c0b2cd0c795acae105250ac6d9896e86e8e39bcd089d6
-
Size
978KB
-
MD5
4c6ca0d1fedcca505e7d8006eaa01348
-
SHA1
9f5b360fa164afffbf6cc13f9683a1d078096692
-
SHA256
a10e526dc64405ae369c0b2cd0c795acae105250ac6d9896e86e8e39bcd089d6
-
SHA512
0021e5d7a5de5872cff9439e9cd812d407a1d40626be880ebcc871fa399b436e1bd8d3777bcbc64f429d2d8ec0c400c08b841b1cd8b932486e351843a32c54af
-
SSDEEP
24576:yJZU3slG4bT4ihVHg2zG14I6VdsANNRppSml/dav2OFrsSLt:MlG4bHVYF6VdsAnnbl/daOOFrJLt
Malware Config
Signatures
Files
-
a10e526dc64405ae369c0b2cd0c795acae105250ac6d9896e86e8e39bcd089d6.exe windows x86
8ae571e62a3de0944af5f9fc8966bc7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceW
GetEnvironmentVariableW
CloseHandle
WriteFile
CreateFileW
GetModuleFileNameA
SetFilePointer
ReadFile
SystemTimeToFileTime
GetCurrentDirectoryW
LocalFileTimeToFileTime
MultiByteToWideChar
CreateDirectoryW
GetFileAttributesW
SetFileTime
GetModuleHandleW
GetStartupInfoW
user32
wsprintfW
shell32
ShellExecuteW
msvcrt
_XcptFilter
??2@YAPAXI@Z
__CxxFrameHandler
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
_CxxThrowException
wcscat
sprintf
calloc
free
malloc
wcslen
wcscpy
wcsstr
_exit
??0exception@@QAE@ABQBD@Z
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
_controlfp
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 929KB - Virtual size: 929KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ