Static task
static1
Behavioral task
behavioral1
Sample
a03be0963eb5fb1ee3dc37e24d25e9a1420e3634dcf55d331636fd2bc4604f20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a03be0963eb5fb1ee3dc37e24d25e9a1420e3634dcf55d331636fd2bc4604f20.exe
Resource
win10v2004-20221111-en
General
-
Target
a03be0963eb5fb1ee3dc37e24d25e9a1420e3634dcf55d331636fd2bc4604f20
-
Size
553KB
-
MD5
517987df3c4ac619e6485d3cefd85d66
-
SHA1
c52a3217fc6930956ea677fe0c5cea7bb7625164
-
SHA256
a03be0963eb5fb1ee3dc37e24d25e9a1420e3634dcf55d331636fd2bc4604f20
-
SHA512
e2ba322bde349b57e37dd721c7bd6b64b8a513ed9717ad30dbe20de9cb3d028e8501b505c35d825f5ea9496273bcdc482e43bde13c4db073821eaa8419e7dd86
-
SSDEEP
12288:AeBhTAy4rGyBK79hnsa40AM0zhCmIGCksSbQqkBwPfKsHmeBHbY:AeBh0y4BeHsa40/0zNwksWQLwPfKsHm3
Malware Config
Signatures
Files
-
a03be0963eb5fb1ee3dc37e24d25e9a1420e3634dcf55d331636fd2bc4604f20.exe windows x86
311ace1ad84d762545e7e5e2aa3d7310
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHQueryRecycleBinA
kernel32
FreeLibrary
VirtualLock
GetConsoleMode
GetStringTypeW
GetOEMCP
OpenSemaphoreW
VirtualQuery
RtlUnwind
SetUnhandledExceptionFilter
CreateMutexA
GetVolumeInformationA
GetModuleFileNameA
GetTimeFormatA
CompareStringW
GetEnvironmentStringsW
GetTickCount
IsDebuggerPresent
AllocConsole
HeapFree
GetProcAddress
SetFileTime
InterlockedIncrement
TlsSetValue
GetConsoleCP
InitializeCriticalSection
HeapAlloc
MultiByteToWideChar
GetStartupInfoA
FreeEnvironmentStringsW
WriteConsoleA
ExitProcess
GetTimeZoneInformation
SetFilePointer
SystemTimeToTzSpecificLocalTime
CreateFileA
GetConsoleOutputCP
TlsAlloc
GetStdHandle
CompareStringA
HeapReAlloc
GetCurrentProcess
SetHandleCount
SetLastError
ReadFileEx
SetConsoleCtrlHandler
TlsFree
DeleteCriticalSection
GetVersionExA
GetCurrentThreadId
WriteConsoleW
GetLastError
Sleep
SetStdHandle
GetSystemTimeAsFileTime
WriteConsoleInputW
GetCurrentThread
UnhandledExceptionFilter
QueryPerformanceCounter
GetDateFormatA
OpenMutexA
WriteFile
lstrcpyn
GetProfileStringA
SetEnvironmentVariableA
InterlockedExchange
VirtualAlloc
LCMapStringA
EnumSystemLocalesA
HeapDestroy
LoadLibraryA
TlsGetValue
GetCurrentProcessId
EnumSystemLocalesW
GetLocaleInfoW
InterlockedDecrement
CreateProcessA
WideCharToMultiByte
GetLocaleInfoA
GetUserDefaultLCID
CloseHandle
VirtualFree
EnterCriticalSection
GetFileType
ReadFile
IsValidCodePage
FlushFileBuffers
GetCompressedFileSizeA
GetModuleHandleA
LCMapStringW
GlobalAddAtomW
IsValidLocale
HeapSize
GetCommandLineA
LeaveCriticalSection
TerminateProcess
HeapCreate
FindFirstFileW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetACP
GetStringTypeA
EnumDateFormatsExA
GetCPInfo
GetProcessHeap
comctl32
InitCommonControlsEx
user32
DdeImpersonateClient
RegisterClassExA
ChangeMenuW
RegisterClassA
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 358KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ