Static task
static1
Behavioral task
behavioral1
Sample
a30e3c40d6d2748eafa21d80335ce4429fb3c7a995bd73b8c577a3131218b8c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a30e3c40d6d2748eafa21d80335ce4429fb3c7a995bd73b8c577a3131218b8c7.exe
Resource
win10v2004-20220812-en
General
-
Target
a30e3c40d6d2748eafa21d80335ce4429fb3c7a995bd73b8c577a3131218b8c7
-
Size
344KB
-
MD5
63a0317e7a8b332b586ef001c7bcedd6
-
SHA1
c52b9c0734a706b8d94e580ee5fa95f6508e5db2
-
SHA256
a30e3c40d6d2748eafa21d80335ce4429fb3c7a995bd73b8c577a3131218b8c7
-
SHA512
79e06fa92edc63a8ed0da3575e3ebf12573f34fecd4e135ddcb4fc428c1cd9728a14847e85b032b0db993e9b95cbff2276325dfa20f9fc6b6b508d2bd9f2960f
-
SSDEEP
6144:ETmUMAvNSDyDISthp8UxTmUMAvNSDyDISthp8UzTyvs:ETIAVSDyttjhTIAVSDyttj/J
Malware Config
Signatures
Files
-
a30e3c40d6d2748eafa21d80335ce4429fb3c7a995bd73b8c577a3131218b8c7.exe windows x86
77a0931f76ff2d733a3bcac388b5a8e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
ftell
fflush
_wcsrev
_fcloseall
wcsncpy
_wcslwr
_wcsicmp
wcsstr
_wcsupr
wcslen
wcscat
_wfopen
fseek
fread
fclose
wcscmp
exit
wcsrchr
wcscpy
fwrite
??3@YAXPAX@Z
??2@YAPAXI@Z
_itoa
kernel32
GetStartupInfoA
GetModuleHandleA
LocalAlloc
LocalFree
CompareFileTime
GetSystemDirectoryW
GetFileTime
SetFileTime
CreateDirectoryW
GetSystemTime
FindFirstFileW
FindNextFileW
FindClose
MultiByteToWideChar
GetDriveTypeW
GetFileAttributesA
GetModuleFileNameA
GetTempPathW
WideCharToMultiByte
WriteFile
LockResource
GetFileAttributesW
LoadResource
SizeofResource
FindResourceW
CreateMutexW
SetThreadPriority
GetCurrentThread
GetCurrentProcess
SetPriorityClass
GetEnvironmentVariableW
GetShortPathNameW
Sleep
CreateProcessW
GetStartupInfoW
CloseHandle
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileW
DeleteFileW
SetFileAttributesW
CopyFileW
GetLastError
GetModuleFileNameW
SetCurrentDirectoryW
GetWindowsDirectoryW
CreateThread
GetProcAddress
LoadLibraryW
GetCurrentDirectoryW
user32
TranslateMessage
GetMessageW
RegisterClassExW
LoadCursorW
LoadIconW
GetDesktopWindow
UpdateWindow
CreateWindowExW
DefWindowProcW
wsprintfW
DispatchMessageW
advapi32
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
AllocateAndInitializeSid
OpenProcessToken
OpenThreadToken
ImpersonateSelf
shell32
SHGetPathFromIDListW
ShellExecuteA
ShellExecuteW
ShellExecuteExW
SHChangeNotify
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ