Static task
static1
Behavioral task
behavioral1
Sample
a48e79f0ddcb5210001745579aa8de0cebe3972d50fbea93381b9750c9d0e9da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a48e79f0ddcb5210001745579aa8de0cebe3972d50fbea93381b9750c9d0e9da.exe
Resource
win10v2004-20220901-en
General
-
Target
a48e79f0ddcb5210001745579aa8de0cebe3972d50fbea93381b9750c9d0e9da
-
Size
154KB
-
MD5
ce0c8ff3983e01ec706f96704efee5fd
-
SHA1
2ab36e12e1203d9eeb7ca26903351211158b8d01
-
SHA256
a48e79f0ddcb5210001745579aa8de0cebe3972d50fbea93381b9750c9d0e9da
-
SHA512
c495329bbb1f598a65d423e932b5a57591edda1a42d6d59e1c2b2009eca764956288f2854b410f75183a13b96d1a35aa1ada45975db7f0644e5a80ad173c34d0
-
SSDEEP
3072:rWiLFmDaA2IBrWadVz3xbOBEc+m56H2zkCNmdDcHl8wAK73p:HL0GgWkBBiBEji6H2zkU4DcHl1AKN
Malware Config
Signatures
Files
-
a48e79f0ddcb5210001745579aa8de0cebe3972d50fbea93381b9750c9d0e9da.exe windows x86
f083b34ba7d0c3fb7ac9f4fd404c9c39
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
GetSystemDirectoryA
GetSystemTime
GetCurrentThreadId
SetEvent
ExitProcess
VirtualFreeEx
Sleep
GetProcessHeap
GetLastError
WaitForSingleObject
GetModuleHandleA
GetProcAddress
FindNextFileA
user32
DestroyWindow
IsIconic
IsWindowVisible
LoadIconA
LoadStringA
ShowWindow
EnumThreadWindows
CreateWindowExA
LoadBitmapA
advapi32
CopySid
AddAce
shell32
DuplicateIcon
ole32
CoUninitialize
msvfw32
DrawDibSetPalette
avifil32
AVIStreamCreate
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 300KB - Virtual size: 297KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 12KB - Virtual size: 353KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ