Static task
static1
Behavioral task
behavioral1
Sample
a22743e2ea9b9a6a0b680bce0af54988e7f67682efa7507b191554e880648d70.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a22743e2ea9b9a6a0b680bce0af54988e7f67682efa7507b191554e880648d70.exe
Resource
win10v2004-20221111-en
General
-
Target
a22743e2ea9b9a6a0b680bce0af54988e7f67682efa7507b191554e880648d70
-
Size
977KB
-
MD5
729785f1f6eb1cc7c2d5412960bffc10
-
SHA1
9b05214bf6d17e2633103b6944cb23fd62292b44
-
SHA256
a22743e2ea9b9a6a0b680bce0af54988e7f67682efa7507b191554e880648d70
-
SHA512
9ca5ebc1836b3b54e7fc3ed0dc308fea19587bd9e62db2f9926e2ff554221e9a554fe04b9239856ee21b590972f1bf73e9d5798ed9071edbac13a418c582c2ed
-
SSDEEP
3072:o4YVB4g4jxUQgK+mkE2sJkYGyTQ0LiWIcOiVmKb2qh5+4zFZGmBdbCtS6:o4cBZ4jCQReENTQ+TZ/UId6
Malware Config
Signatures
Files
-
a22743e2ea9b9a6a0b680bce0af54988e7f67682efa7507b191554e880648d70.exe windows x86
336f8c1360810af58ce30805fed62ee4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CopyEnhMetaFileA
GetCharABCWidthsA
SetAbortProc
AddFontResourceW
GdiEndDocEMF
GetTextAlign
SelectClipRgn
SetDCPenColor
kernel32
CloseHandle
CreateMailslotW
FreeLibrary
GetConsoleOutputCP
GetCurrentThread
GetFileAttributesW
GetFileSizeEx
InterlockedCompareExchange
InterlockedDecrement
InterlockedIncrement
LocalAlloc
LocalFree
MapViewOfFile
ReadConsoleOutputCharacterA
SetLocaleInfoA
Sleep
SleepEx
CopyFileA
CreateDirectoryA
DisableThreadLibraryCalls
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
GetWindowsDirectoryA
GlobalFindAtomW
OpenMutexW
QueryPerformanceCounter
SetUnhandledExceptionFilter
TerminateProcess
Thread32First
UnhandledExceptionFilter
WriteProcessMemory
VirtualAlloc
GetLastError
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
ExitProcess
HeapFree
HeapAlloc
MultiByteToWideChar
IsDBCSLeadByteEx
ReadConsoleA
GetConsoleCP
ReadConsoleW
SetConsoleMode
GetConsoleMode
GetLocalTime
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeA
GetStringTypeW
IsDebuggerPresent
LCMapStringA
LCMapStringW
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
SetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
GetFileType
CreateFileW
ReadFile
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
CreateFileA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
RtlUnwind
GetLocaleInfoW
SetStdHandle
SetFilePointer
SetEndOfFile
GetTimeZoneInformation
WriteConsoleA
WriteConsoleW
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
ole32
STGMEDIUM_UserSize
HWND_UserFree
CoWaitForMultipleHandles
oleaut32
VarDecFromI2
VarDecCmpR8
BSTR_UserUnmarshal
VarUI4FromDec
CreateErrorInfo
Sections
.text Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 288KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 460KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE