Static task
static1
Behavioral task
behavioral1
Sample
a5ec218dacfc3f5ae6a9644a895ea780c7351c2466e3661d6a6850258b8b4fd4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a5ec218dacfc3f5ae6a9644a895ea780c7351c2466e3661d6a6850258b8b4fd4.exe
Resource
win10v2004-20221111-en
General
-
Target
a5ec218dacfc3f5ae6a9644a895ea780c7351c2466e3661d6a6850258b8b4fd4
-
Size
128KB
-
MD5
73bc20adae596d78a32e295f37fd3355
-
SHA1
1d5b66e1148209b544d3334ed65436ac8348f064
-
SHA256
a5ec218dacfc3f5ae6a9644a895ea780c7351c2466e3661d6a6850258b8b4fd4
-
SHA512
18061ae402d7986eff9395f26b067d79ad837ccf5c62559617790f93250f8009b771ba44df388cde7e889ef9c4bb127a42700ca7cf116f8d42e01c55933c1a9f
-
SSDEEP
1536:SZ8L8zdoytSHjR7O4mZU86wYUCmp7VIzcx2oZlDA4dcNG:5NRC4L86uCm/qcx2wlDv
Malware Config
Signatures
Files
-
a5ec218dacfc3f5ae6a9644a895ea780c7351c2466e3661d6a6850258b8b4fd4.exe windows x86
43c05261ae8526f82db556ccd27402b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
fflush
fprintf
fopen
fclose
user32
GetKeyNameTextA
GetForegroundWindow
GetClipboardData
CloseClipboard
GetKeyState
GetMessageA
RegisterHotKey
SetWindowsHookExA
ToAscii
UnhookWindowsHookEx
CallNextHookEx
GetKeyboardState
GetWindowTextA
IsClipboardFormatAvailable
MessageBoxA
OpenClipboard
kernel32
LeaveCriticalSection
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
lstrcatA
_lwrite
_lread
_lopen
_lcreat
_lclose
WriteProcessMemory
VirtualUnlock
VirtualLock
VirtualFree
VirtualAllocEx
VirtualAlloc
CloseHandle
CopyFileA
CreateProcessA
CreateThread
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
GetCurrentDirectoryA
GetCurrentProcessId
GetDateFormatA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetSystemInfo
GetThreadContext
GetTimeFormatA
GetVersionExA
GlobalAlloc
GlobalFree
GlobalLock
GlobalSize
GlobalUnlock
InitializeCriticalSection
FindFirstFileA
LoadLibraryA
LoadLibraryExA
LocalFree
ResumeThread
SetCurrentDirectoryA
SetThreadContext
Sleep
advapi32
SetSecurityInfo
SetEntriesInAclW
GetSecurityInfo
wininet
InternetGetConnectedState
wsock32
recv
htons
socket
connect
closesocket
WSAStartup
gethostbyname
send
ntdll
NtQuerySystemInformation
NtMapViewOfSection
NtUnmapViewOfSection
NtOpenSection
shell32
ShellExecuteA
Sections
0 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE