Static task
static1
Behavioral task
behavioral1
Sample
5aad532271b4266719da784175d7c090bb5dcb1353f2f1360c5cc3304b35b958.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5aad532271b4266719da784175d7c090bb5dcb1353f2f1360c5cc3304b35b958.exe
Resource
win10v2004-20221111-en
General
-
Target
5aad532271b4266719da784175d7c090bb5dcb1353f2f1360c5cc3304b35b958
-
Size
49KB
-
MD5
ed141b057f508e298f41a49f95739ae2
-
SHA1
746407357e1a2c5eddc6ecb71a5009131bdc5957
-
SHA256
5aad532271b4266719da784175d7c090bb5dcb1353f2f1360c5cc3304b35b958
-
SHA512
24f8dfbfb4277da7e895f022923e37a86e65f4600331829606a877e01be138823609c25722da9dc107d46446f53be71b54013b30739e9dd7efe16afe76da9fa2
-
SSDEEP
1536:SkVouOe6Q36FqDLJCnY+Gs2IMrv5PwF5w:BVZ5KCLJCL2Sn
Malware Config
Signatures
Files
-
5aad532271b4266719da784175d7c090bb5dcb1353f2f1360c5cc3304b35b958.exe windows x86
d5c23b3736cf3eab657bba63b1853a03
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrChrW
kernel32
CreateJobObjectA
SetConsoleCtrlHandler
lstrcpyW
GetEnvironmentVariableW
GetLastError
CreateProcessW
GetBinaryTypeW
HeapFree
WideCharToMultiByte
ExitProcess
HeapAlloc
GetProcessHeap
lstrlenW
EnumLanguageGroupLocalesW
ReadFile
GetFileSize
CreateFileW
VirtualAlloc
GetConsoleWindow
LocalFree
WriteFile
GetOEMCP
WriteConsoleW
SetInformationJobObject
CompareStringW
FindClose
FindFirstFileW
GetFileAttributesW
lstrcatW
GetFullPathNameW
LoadLibraryW
MultiByteToWideChar
Sleep
IsValidCodePage
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
GetConsoleCP
SetFilePointer
AssignProcessToJobObject
WaitForSingleObject
GetExitCodeProcess
GetSystemTimeAsFileTime
RtlUnwind
GetStdHandle
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
FlushFileBuffers
CloseHandle
HeapSize
SetLastError
HeapReAlloc
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetStringTypeW
LCMapStringW
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
SetStdHandle
odbc32
ord59
ord54
ord29
ord257
ValidateErrorQueue
ord30
oleaut32
VarCyCmpR8
VarDecSu
VarR4FromI4
RegisterTypeLi
VarI2FromUI2
msvfw32
DrawDibClose
ICSeqCompressFrameStart
GetOpenFileNamePreviewW
avifil32
IID_IAVIEditStream
AVIFileGetStream
AVIFileInfoW
EditStreamSetInfoA
EditStreamCopy
shell32
Shell_NotifyIconW
Shell_NotifyIconA
ShellAboutA
ShellExecuteExW
winspool.drv
GetPrinterDataExA
DeletePrinterDriverA
DeviceCapabilitiesA
ole32
OleIsCurrentClipboard
OleBuildVersion
OleCreateLinkToFile
msacm32
acmFormatSuggest
acmFilterTagEnumW
acmStreamSize
XRegThunkEntry
acmFilterChooseA
user32
ShowWindow
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE