Static task
static1
Behavioral task
behavioral1
Sample
a122a04b0038d1751e9955c828cadf188ab23768682075e60084aa1ed239f393.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a122a04b0038d1751e9955c828cadf188ab23768682075e60084aa1ed239f393.exe
Resource
win10v2004-20221111-en
General
-
Target
a122a04b0038d1751e9955c828cadf188ab23768682075e60084aa1ed239f393
-
Size
46KB
-
MD5
f468041eb843e11e37c24d83c5c393c1
-
SHA1
03e77145ffdc00b865e1aee50142d0bc0848f6c2
-
SHA256
a122a04b0038d1751e9955c828cadf188ab23768682075e60084aa1ed239f393
-
SHA512
371d4955902107ce81e48c8a28bc8541f1ef5361c72ae27e935be984c7a8e6b0fe5bd896966d7d3f9a4daa6962343b6e2471d7d42cc42aebc020f22b0ab44897
-
SSDEEP
768:4Z6btc32LWxh5ZkTZC0LuDFROqCqSwnOhLseBp77eTtNYn+/f:44UKWVaZCLDSqC7SULseBp32oq
Malware Config
Signatures
Files
-
a122a04b0038d1751e9955c828cadf188ab23768682075e60084aa1ed239f393.exe windows x86
8903199dc294bd3c83dfe6ee5e10fc34
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
tmpfile
_atoldbl
_tolower
exit
_chdir
__iscsym
_stricmp
_aligned_malloc
??_7bad_cast@@6B@
_adjust_fdiv
difftime
__set_app_type
iswspace
__crtLCMapStringW
_fgetwchar
memcmp
_strdate
wcsxfrm
__getmainargs
__p__commode
kernel32
DebugActiveProcessStop
SetConsoleDisplayMode
CancelDeviceWakeupRequest
ReplaceFileA
DeleteTimerQueueEx
GetLargestConsoleWindowSize
RegisterWaitForSingleObject
GetVolumePathNameA
FindNextVolumeMountPointA
GetProfileStringA
GetSystemTime
GetConsoleAliasExesA
VirtualFree
GetConsoleCursorInfo
HeapCreate
GetProcessTimes
EnumResourceTypesA
GetOEMCP
lstrlenA
GetOverlappedResult
FlushViewOfFile
BaseDumpAppcompatCache
LoadLibraryW
RemoveDirectoryW
DeleteFiber
EnumResourceTypesW
lstrcat
LocalHandle
FindFirstVolumeMountPointW
InitializeSListHead
GetConsoleMode
HeapQueryInformation
OpenJobObjectW
GetProfileSectionW
BeginUpdateResourceW
LoadLibraryExA
SetPriorityClass
CmdBatNotification
SetConsoleFont
FindFirstFileExA
ExitVDM
SetFileAttributesA
GetCommandLineW
ntdll
ZwPowerInformation
RtlGetCurrentDirectory_U
ZwSetQuotaInformationFile
RtlAreAnyAccessesGranted
NtDuplicateToken
ZwQuerySection
RtlInitializeAtomPackage
NtLoadDriver
NtSetBootOptions
ZwResumeProcess
toupper
NtQueryFullAttributesFile
RtlCompareMemory
NtQuerySystemInformation
NtUnlockFile
ZwAcceptConnectPort
ZwCreateKey
NtNotifyChangeDirectoryFile
ispunct
ZwQueryDefaultUILanguage
ZwCancelIoFile
LdrEnumResources
ZwQueryAttributesFile
RtlNewSecurityGrantedAccess
sqrt
RtlPushFrame
RtlInterlockedPopEntrySList
msvcirt
??_Gstrstream@@UAEPAXI@Z
??0ifstream@@QAE@ABV0@@Z
??1strstream@@UAE@XZ
??0istrstream@@QAE@PADH@Z
?x_lockc@ios@@0U_CRT_CRITICAL_SECTION@@A
?setbuf@fstream@@QAEPAVstreambuf@@PADH@Z
?ends@@YAAAVostream@@AAV1@@Z
?snextc@streambuf@@QAEHXZ
?sgetc@streambuf@@QAEHXZ
user32
EndDialog
MessageBoxW
shell32
SHGetMalloc
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ