Static task
static1
Behavioral task
behavioral1
Sample
ba190068511187116eadbdebfd3ea4b006f3783ecfc01dfa3a0437c703a62762.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba190068511187116eadbdebfd3ea4b006f3783ecfc01dfa3a0437c703a62762.exe
Resource
win10v2004-20221111-en
General
-
Target
ba190068511187116eadbdebfd3ea4b006f3783ecfc01dfa3a0437c703a62762
-
Size
444KB
-
MD5
d0f1ecd133cda02fdb1b439874307160
-
SHA1
80c5d133c3155f65c915d09fe17cff05469f67a0
-
SHA256
ba190068511187116eadbdebfd3ea4b006f3783ecfc01dfa3a0437c703a62762
-
SHA512
fd438e7b4e342eb31c4dfc741b57a3ffdba4078f45e2e0a1a4f29b283c6d915de918d71d83e3bcd0d989420dc261b5fd4c929743fb507ac1ec37dc16d554d400
-
SSDEEP
6144:RO32D5Sm4uo832Ccl/Fz5rt1dPEnDZ2kDrYFkQiYZEUswRUePmUj/J3ZXcD:RJSDv8GCcrNrTeZbrCliYZNb/7sD
Malware Config
Signatures
Files
-
ba190068511187116eadbdebfd3ea4b006f3783ecfc01dfa3a0437c703a62762.exe windows x86
160dfddb9643a1ea000b880ea7ab7dc2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
LockFile
SetFilePointer
CreateFileA
GetTempPathA
Sleep
GetProcAddress
GetModuleHandleA
GetLastError
CreateSemaphoreA
GetCurrentThreadId
VirtualFree
CreateWaitableTimerA
GetTickCount
WriteFile
FlushFileBuffers
VirtualQuery
VirtualProtect
RtlUnwind
GetLocaleInfoA
UnlockFile
CloseHandle
GetLocalTime
GetSystemInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
HeapFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
user32
LoadAcceleratorsA
GetSysColorBrush
GetWindow
UpdateWindow
SendMessageA
IsIconic
EndPaint
IsWindowVisible
ImpersonateDdeClientWindow
InSendMessage
wsprintfA
LoadIconA
gdi32
FloodFill
CreateSolidBrush
SelectObject
shell32
DuplicateIcon
msvfw32
DrawDibGetBuffer
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 368KB - Virtual size: 367KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 405KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ