Static task
static1
Behavioral task
behavioral1
Sample
a4bbd2539e9b8b125f104d74be170d48d16d51237b6e553b0bf09263b74e944a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4bbd2539e9b8b125f104d74be170d48d16d51237b6e553b0bf09263b74e944a.exe
Resource
win10v2004-20221111-en
General
-
Target
a4bbd2539e9b8b125f104d74be170d48d16d51237b6e553b0bf09263b74e944a
-
Size
515KB
-
MD5
27330d4d55951b6d00ad3c5c89a16190
-
SHA1
68cad1be27d4fc3bc843f517a2c36ae29a1f9549
-
SHA256
a4bbd2539e9b8b125f104d74be170d48d16d51237b6e553b0bf09263b74e944a
-
SHA512
4fa65ed7a128861307cdc613b48cf23f898773e9816587a59ccbdcf50826d59b1ede1fd083e5a2357597b861cb7a02919bb8795e622bb09affeb26f48a925f0b
-
SSDEEP
6144:Hl9aFfj3EPwkDHS0aShWE6Ad4MZQooGYZ7Sph3HudHEKBo/m6lKiAUh1n2EM8uEN:F9alTaPkpP8YlSpBHum2iR2VlUGwetOH
Malware Config
Signatures
Files
-
a4bbd2539e9b8b125f104d74be170d48d16d51237b6e553b0bf09263b74e944a.exe windows x86
8d9e73fcb6bd596c7fa9109af2408708
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
WindowFromPoint
LoadStringA
GetClientRect
SetWindowTextA
LoadIconW
RemoveMenu
DefWindowProcA
kernel32
HeapReAlloc
LoadLibraryExA
SizeofResource
DeleteFileW
GetModuleHandleA
MultiByteToWideChar
GetCommandLineA
GetCurrentProcess
GetSystemTime
DeleteFileA
GetProcAddress
FindFirstFileW
OpenEventA
GetProcessHeap
ExitProcess
LocalAlloc
SetEndOfFile
CreateDirectoryA
LoadLibraryA
GetSystemTimeAsFileTime
VirtualAlloc
HeapSize
FindFirstFileA
Sleep
VirtualFree
GetFileType
msvcrt
??0exception@@QAE@ABV0@@Z
_controlfp
advapi32
RegOpenKeyExA
OpenServiceW
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ