Static task
static1
Behavioral task
behavioral1
Sample
a2f21c2971cdcdeab67e2ae2b6a392bf2a623c047409272eede1d4fcf799839f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2f21c2971cdcdeab67e2ae2b6a392bf2a623c047409272eede1d4fcf799839f.exe
Resource
win10v2004-20220812-en
General
-
Target
a2f21c2971cdcdeab67e2ae2b6a392bf2a623c047409272eede1d4fcf799839f
-
Size
53KB
-
MD5
0c3a5b2fdc0f274210f116cde66c878f
-
SHA1
4537f57c19a2b5d7d8d4a534c50f6f56230224cb
-
SHA256
a2f21c2971cdcdeab67e2ae2b6a392bf2a623c047409272eede1d4fcf799839f
-
SHA512
236e3d93d58fbced20db826d3d165f4efa32c3e4aaddbffceb6c318631d051940b4932060e2a4de8d5a4d04ae7f8bd8cfec6392f418fa176e152cbc47e3bf10c
-
SSDEEP
768:QKyCp3EIPG1IlLOXgYD6mzXzy7wJqAOwG3V3L7GzqYf9nXf/74XkS6WyqFQPy+H4:Tu1IcXgIPzy7wG30WaXXsXkSbMa621
Malware Config
Signatures
Files
-
a2f21c2971cdcdeab67e2ae2b6a392bf2a623c047409272eede1d4fcf799839f.exe windows x86
95f6034059b9a86fa86d3f03159fe5fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
CreateEventA
CloseHandle
GetModuleHandleA
ResetEvent
HeapDestroy
VirtualQuery
HeapCreate
GetVolumePathNameA
GetCommandLineA
GetTimeFormatA
Sleep
FindResourceW
DeleteFileW
CancelIo
TlsGetValue
GetEnvironmentVariableA
GetCommandLineA
lstrlenA
CloseHandle
user32
GetClassInfoA
CreateIcon
GetWindowLongA
IsZoomed
CallWindowProcA
DispatchMessageA
DrawTextW
FindWindowA
GetSysColor
DispatchMessageA
DestroyMenu
IsWindow
PeekMessageA
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE