Static task
static1
Behavioral task
behavioral1
Sample
a133d49bb17042c84a11f37c44f89f1d941b0567cce472375955da3af130cde4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a133d49bb17042c84a11f37c44f89f1d941b0567cce472375955da3af130cde4.exe
Resource
win10v2004-20220812-en
General
-
Target
a133d49bb17042c84a11f37c44f89f1d941b0567cce472375955da3af130cde4
-
Size
18KB
-
MD5
add4adfcec972b2f12420cd4a1164f25
-
SHA1
d21d7fc49d82c5978e61c318b6ad9de6de32c9d5
-
SHA256
a133d49bb17042c84a11f37c44f89f1d941b0567cce472375955da3af130cde4
-
SHA512
6bd76c732a76da461ae5abb4451d9aeecdce4d069aeeb1f8be4483779681ff43626f74d0141ef99ff2eca4a0982309d5d3326b16f6d642d9f4a7132721233c9b
-
SSDEEP
384:OSKTDs3GBTxYk7nCtv+0ZUcAtmp2Qv4JcXXc2OChOMqHjt:Jw3d0WcsQaIXc2O7R
Malware Config
Signatures
Files
-
a133d49bb17042c84a11f37c44f89f1d941b0567cce472375955da3af130cde4.exe windows x86
8b4d13939e18d14d27e265c56e0d3b74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrToIntA
kernel32
HeapDestroy
SetUnhandledExceptionFilter
HeapReAlloc
HeapAlloc
GetSystemInfo
GetVersionExA
GetLastError
DisableThreadLibraryCalls
HeapSize
InterlockedExchange
IsBadCodePtr
GetProcessHeap
IsBadWritePtr
GetStdHandle
HeapCreate
RtlUnwind
LCMapStringA
GetEnvironmentStrings
FreeEnvironmentStringsA
IsDebuggerPresent
RaiseException
SetErrorMode
SetStdHandle
ExitProcess
LocalFree
FormatMessageA
ReadFile
CreateFileA
VirtualAlloc
GetModuleHandleA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
user32
MessageBoxA
wsprintfA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ