Static task
static1
Behavioral task
behavioral1
Sample
a66a49fa7948439212ec323b78a5d6b42be6f8674335b88f915ea7e4168778cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a66a49fa7948439212ec323b78a5d6b42be6f8674335b88f915ea7e4168778cc.exe
Resource
win10v2004-20220812-en
General
-
Target
a66a49fa7948439212ec323b78a5d6b42be6f8674335b88f915ea7e4168778cc
-
Size
170KB
-
MD5
4be04cbd8e0a86c76d24221c1a274b83
-
SHA1
a84b62ec1fb74d9a32d4e109c9844543d2005ab7
-
SHA256
a66a49fa7948439212ec323b78a5d6b42be6f8674335b88f915ea7e4168778cc
-
SHA512
99933d982ebc4322465b7ef3883f8896238671836c524cd8999007ab5531cffe39c53623fde83c9a3653412161673eca1516b8fc31b48df1f1f745e9e0b89fc4
-
SSDEEP
3072:vOybWU3G5e8TZkxS4XGgjzOxsaVvtbuYoqexK3r3evoGncQNQMhwTl6jIiTAuf1j:JWU3qeObOLuxFVvluYl36wWXNQMhbtT0
Malware Config
Signatures
Files
-
a66a49fa7948439212ec323b78a5d6b42be6f8674335b88f915ea7e4168778cc.exe windows x86
779b6a555fe9513518d70d2e84e0e548
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
rpcrt4
UuidCreate
kernel32
InitializeCriticalSection
WriteConsoleW
GetModuleFileNameW
GetCurrentThreadId
HeapAlloc
GetThreadPriority
GetCPInfo
GetProcessHeap
HeapFree
GetCurrentProcess
GetUserDefaultLCID
EnterCriticalSection
GetModuleHandleA
ReadFile
CloseHandle
GetProcAddress
GetCurrentDirectoryW
SetupComm
GetLastError
IsDebuggerPresent
EnumSystemLocalesA
TerminateProcess
WriteConsoleA
HeapReAlloc
SetStdHandle
LCMapStringA
ExitProcess
GlobalAlloc
LCMapStringW
IsValidLocale
GetCommandLineA
EnumResourceNamesA
UnhandledExceptionFilter
ExitProcess
DeleteCriticalSection
HeapSize
GetVersionExA
RtlUnwind
RaiseException
Sleep
GetConsoleOutputCP
InterlockedDecrement
SetUnhandledExceptionFilter
WriteFile
MultiByteToWideChar
WideCharToMultiByte
SetEndOfFile
CreateFileA
IsValidCodePage
GetLocaleInfoW
InterlockedIncrement
LeaveCriticalSection
GetFullPathNameW
GetFullPathNameA
shell32
SHCreateDirectoryExW
SHFileOperationW
SHGetFolderPathW
user32
GetAncestor
MessageBoxW
Sections
.text Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ