Static task
static1
Behavioral task
behavioral1
Sample
a0eb59277b1e3b2d9f6fa27e5d687e26a3d6515e123aeaeeb874f0b402c374b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0eb59277b1e3b2d9f6fa27e5d687e26a3d6515e123aeaeeb874f0b402c374b4.exe
Resource
win10v2004-20220812-en
General
-
Target
a0eb59277b1e3b2d9f6fa27e5d687e26a3d6515e123aeaeeb874f0b402c374b4
-
Size
15KB
-
MD5
1f4cf8dd0bf1b0fc377f2f445a411719
-
SHA1
22c9b674d512ec540b56cefa64f3480f7ab98260
-
SHA256
a0eb59277b1e3b2d9f6fa27e5d687e26a3d6515e123aeaeeb874f0b402c374b4
-
SHA512
04bafd1d596a0c1ec9eb94e3076c2085598ea52f28293644b1c49d02467eb3c52f6f72b7ce16d3ada8db6ed1a43b3dbc9c3e773bde4e3240e87bfe5af582caa4
-
SSDEEP
384:tB8qbywm2gqbh3X1xEAaXc01aosx+xrba:f8qc2l1rEAec0Yosx2rba
Malware Config
Signatures
Files
-
a0eb59277b1e3b2d9f6fa27e5d687e26a3d6515e123aeaeeb874f0b402c374b4.exe windows x86
0a5804082c3319edf194e24ab0aafc1b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocalTime
GetVersion
LocalAlloc
FindClose
GlobalDeleteAtom
GetVersionExA
CreateProcessA
GetLastError
SetThreadPriority
GetThreadPriority
EnterCriticalSection
GetCurrentThread
FreeLibrary
InterlockedDecrement
GetFullPathNameW
LoadLibraryW
InitializeCriticalSection
CloseHandle
GetPrivateProfileStructA
UnmapViewOfFile
SystemTimeToFileTime
Sleep
MultiByteToWideChar
WritePrivateProfileStringW
GetProcessHeap
VirtualProtectEx
ReadFile
CreateWaitableTimerA
lstrcmpW
TryEnterCriticalSection
GetCurrentProcess
SetUnhandledExceptionFilter
ntdll
NtDeviceIoControlFile
ZwOpenKey
NtCreateToken
NtOpenEvent
ZwFlushKey
ZwGetPlugPlayEvent
NtOpenIoCompletion
NtFlushBuffersFile
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ