Static task
static1
Behavioral task
behavioral1
Sample
adb3762d35eee95dc7f8c0994b017762e18afbad0aa45491906e32b5728112f8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
adb3762d35eee95dc7f8c0994b017762e18afbad0aa45491906e32b5728112f8.exe
Resource
win10v2004-20230220-en
General
-
Target
adb3762d35eee95dc7f8c0994b017762e18afbad0aa45491906e32b5728112f8
-
Size
1.5MB
-
MD5
5f771740793c72e78086acfa7ce1afc4
-
SHA1
548b339cdf24bfbee14156b469f55e1c1582e9be
-
SHA256
adb3762d35eee95dc7f8c0994b017762e18afbad0aa45491906e32b5728112f8
-
SHA512
bf29f31d6159fe6079193c1f2876fffcbb523cb3c9938318309aedba7e112883e9360dbbff00e4bf1386c6176c4c52f95acc909491383270fc28c8e4a4c5ce9f
-
SSDEEP
24576:YP1vRxpjk0NHZO6BZ4wm9jHykfrTDM/Qrzu4u8SJ79tk2KhLYZVEQGo03iobm:YtvPv7B+X9jl/4QrQ8SXtHKhYZOQO7m
Malware Config
Signatures
Files
-
adb3762d35eee95dc7f8c0994b017762e18afbad0aa45491906e32b5728112f8.exe windows x86
a65bfde8279dde710da5d8253fe6cc81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
CloseHandle
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesW
lstrcpynW
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
CreateFileW
LoadResource
LockResource
GetModuleFileNameW
CreateProcessW
WaitForSingleObject
GetWindowsDirectoryW
FindFirstFileW
FindNextFileW
FindClose
GetTempPathW
GetTickCount
Sleep
CreateDirectoryW
RemoveDirectoryW
WriteFile
FindResourceW
SizeofResource
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetLastError
ReadFile
GetConsoleCP
GetConsoleMode
SetFilePointer
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetProcessHeap
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetFileType
CreateFileA
SetHandleCount
GetStdHandle
GetStartupInfoA
DeleteCriticalSection
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
SetEndOfFile
InitializeCriticalSection
RtlUnwind
GetCPInfo
GetOEMCP
IsValidCodePage
LoadLibraryA
HeapSize
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
shell32
SHFileOperationW
shlwapi
PathIsDirectoryW
PathRemoveFileSpecW
wnsprintfW
PathAppendW
StrStrIW
PathFileExistsW
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ