Static task
static1
Behavioral task
behavioral1
Sample
a405288cc8a8dcee6e3711a9358de4a544ed544a74d7de32ddcf871bbc3da325.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a405288cc8a8dcee6e3711a9358de4a544ed544a74d7de32ddcf871bbc3da325.exe
Resource
win10v2004-20220901-en
General
-
Target
a405288cc8a8dcee6e3711a9358de4a544ed544a74d7de32ddcf871bbc3da325
-
Size
173KB
-
MD5
f22551db2be033c5622e42b0c8b1f6ee
-
SHA1
237a10a265bad96cde6d142b69e6172a686f9264
-
SHA256
a405288cc8a8dcee6e3711a9358de4a544ed544a74d7de32ddcf871bbc3da325
-
SHA512
1654d996c783db7e9ffa940dc06ea9e2cfe3c6c58f6562934239132c8dd5b040ea58c9f82be8ba093edc83fce2445dc9a6a2bdf7ff73a3a8001e0dc6a8c1acb2
-
SSDEEP
3072:q0yB/C2wddcNg54gnNYTPDE9AARz6ADtOsO0GdCbP8QGUHAUa1:q0e/C3P44mPDE9A8DoRBQ0
Malware Config
Signatures
Files
-
a405288cc8a8dcee6e3711a9358de4a544ed544a74d7de32ddcf871bbc3da325.exe windows x86
2bac706cb20374fa4ae16ad1cab22145
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
EnterCriticalSection
GetCurrentThreadId
GetCommandLineA
GetFileAttributesA
GetStringTypeA
DeleteCriticalSection
GetLastError
LockResource
WriteFile
GetLocaleInfoA
FormatMessageA
SetEvent
GetSystemDefaultLangID
GetFullPathNameA
ExitThread
GlobalAddAtomA
ExitProcess
SetHandleCount
GetModuleFileNameA
FindFirstFileA
RaiseException
GetCurrentThread
ResetEvent
GetThreadLocale
GetACP
VirtualFree
GetStartupInfoA
FindClose
CreateFileA
SetEndOfFile
FreeResource
GetDateFormatA
FindResourceA
SizeofResource
GetProcessHeap
GetDiskFreeSpaceA
CompareStringA
GetStringTypeW
SetThreadLocale
lstrcpynA
Sleep
GetEnvironmentStrings
GlobalAlloc
GetVersion
CreateThread
LoadLibraryA
WaitForSingleObject
EnumCalendarInfoA
VirtualAllocEx
GetModuleHandleA
DeleteFileA
CloseHandle
GetUserDefaultLCID
HeapDestroy
HeapAlloc
SetFilePointer
VirtualQuery
GetFileType
GetCurrentProcess
HeapFree
lstrlenA
GlobalFindAtomA
user32
GetSysColor
GetCapture
GetKeyNameTextA
DispatchMessageA
GetParent
DrawFrameControl
SetWindowLongA
GetCursorPos
IsChild
CallNextHookEx
DrawIconEx
EnableMenuItem
GetMenuState
SetWindowPos
GetScrollInfo
GetWindowTextA
CharNextA
GetMenuItemInfoA
EnumThreadWindows
IsDialogMessageA
GetClassInfoA
GetWindow
CreateWindowExA
DrawIcon
GetDCEx
GetClientRect
SystemParametersInfoA
CallWindowProcA
SetCursor
GetMenuItemCount
DrawTextA
DrawMenuBar
GetScrollPos
ClientToScreen
GetMenuStringA
GetScrollRange
GetFocus
EnableScrollBar
GetClassLongA
MessageBoxA
BeginDeferWindowPos
EqualRect
DeferWindowPos
DefMDIChildProcA
DefWindowProcA
ShowWindow
GetLastActivePopup
CharLowerBuffA
EndPaint
CreatePopupMenu
EnumChildWindows
FrameRect
GetActiveWindow
TrackPopupMenu
DispatchMessageW
DrawEdge
FillRect
CharToOemA
GetDesktopWindow
HideCaret
GetSysColorBrush
GetDC
oleaut32
SafeArrayGetUBound
SafeArrayGetElement
SafeArrayPtrOfIndex
VariantCopyInd
SysAllocStringLen
SafeArrayUnaccessData
msvcrt
log10
pow
memset
sqrt
strlen
memmove
fabs
wcscspn
Sections
CODE Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 4KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ