Static task
static1
Behavioral task
behavioral1
Sample
a04462c9cecc82c7e0d4d85d18ec4883dd13aa40585d6cbda253772ee9f8cefa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a04462c9cecc82c7e0d4d85d18ec4883dd13aa40585d6cbda253772ee9f8cefa.exe
Resource
win10v2004-20220812-en
General
-
Target
a04462c9cecc82c7e0d4d85d18ec4883dd13aa40585d6cbda253772ee9f8cefa
-
Size
76KB
-
MD5
eca6088265763ea4f832f8e5a027d991
-
SHA1
2ca13b3c401061ce7bf15bd5f097c6f40dc72f9e
-
SHA256
a04462c9cecc82c7e0d4d85d18ec4883dd13aa40585d6cbda253772ee9f8cefa
-
SHA512
70a72a60500f9197124a0e5f1f6bf200c3dd55afc35a41c9dace28140127a4914d85d2949d7f2f58032375562b13f4f5dd12fb91d71f1f3b453f443e2368d5c0
-
SSDEEP
1536:NFJev3S7erIoUi/GbT8LHNnrrqcg8HyP:HJevUerS2Hlrrg8S
Malware Config
Signatures
Files
-
a04462c9cecc82c7e0d4d85d18ec4883dd13aa40585d6cbda253772ee9f8cefa.exe windows x86
6694b436c6cb48f74fdf121b77d06c23
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
HeapAlloc
GetProcAddress
GetModuleHandleA
LoadLibraryA
InterlockedDecrement
LocalFree
InterlockedIncrement
GetVersionExW
UnhandledExceptionFilter
user32
EnumChildWindows
SetScrollPos
EndMenu
EndDialog
EndDeferWindowPos
EnableScrollBar
EnableMenuItem
EmptyClipboard
CloseClipboard
ClipCursor
ClientToScreen
ChildWindowFromPointEx
ChildWindowFromPoint
GetWindowTextLengthW
EnableWindow
DialogBoxParamW
CreateDialogParamW
GetWindowTextW
SetWindowPos
SetCursor
SetForegroundWindow
FindWindowW
GetSystemMetrics
MoveWindow
SendMessageW
CharNextW
CheckMenuItem
CharPrevExA
CharPrevW
CharToOemA
CharToOemBuffA
CharToOemBuffW
CheckDlgButton
CopyIcon
CopyImage
EndPaint
gdi32
SetAbortProc
GetTextMetricsW
SetBkMode
StartDocW
SetWindowExtEx
SetViewportExtEx
SetMapMode
CreateFontIndirectW
StartPage
LPtoDP
AbortDoc
EndDoc
DeleteDC
TextOutW
GetTextExtentPoint32W
CreateDCW
SelectObject
GetTextFaceW
EndPage
advapi32
RegOpenKeyW
RegOpenKeyA
msi
ord55
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata1 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata2 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata3 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata4 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata5 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xata6 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ