Static task
static1
Behavioral task
behavioral1
Sample
a5a06b4843655a6716472fc2433634bf8c8e5e95a5b969961b5236379828c51c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a5a06b4843655a6716472fc2433634bf8c8e5e95a5b969961b5236379828c51c.exe
Resource
win10v2004-20220812-en
General
-
Target
a5a06b4843655a6716472fc2433634bf8c8e5e95a5b969961b5236379828c51c
-
Size
851KB
-
MD5
750d1a2d3c8b59693b060b67e0efb800
-
SHA1
3b84c3120849a69607a07550337eeb20fbd53145
-
SHA256
a5a06b4843655a6716472fc2433634bf8c8e5e95a5b969961b5236379828c51c
-
SHA512
6fdd6b38cead008aa692f41bf35ed7a1fe9fcec5690fea727c52d2d1cf5a4aa3684249ea0c9f78b926477e54919942ddf6077478b062fd74e55a0709d05b76cc
-
SSDEEP
12288:OidYOvIfBWNB9MvgFVYPKWugrYyIAd6fVLOApyOgOhvwbiGnQ6gP3zB4EX:v3vzf9kgFiy1gkyIVOApGwJkQ1F4
Malware Config
Signatures
Files
-
a5a06b4843655a6716472fc2433634bf8c8e5e95a5b969961b5236379828c51c.exe windows x86
9a3c28446731815c2dcd73bf2c276088
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPriorityClass
GetStartupInfoA
GetStdHandle
GetModuleHandleA
GetCommandLineA
GetEnvironmentVariableA
HeapCreate
GetModuleFileNameA
IsBadCodePtr
DeleteAtom
CreateMailslotW
ReadFile
GetProcessTimes
HeapDestroy
CloseHandle
DeleteFileA
SuspendThread
GetFileAttributesA
FindAtomA
GetCurrentProcessId
user32
CallWindowProcW
DispatchMessageA
DrawTextW
GetClientRect
IsZoomed
GetWindowLongA
GetClassInfoA
GetKeyState
SetFocus
DispatchMessageA
GetWindowInfo
DestroyMenu
GetSysColor
DestroyMenu
msctfp
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 843KB - Virtual size: 842KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ