Static task
static1
Behavioral task
behavioral1
Sample
4a30395642062d275e7f4e94ddd412e11adf665301bb61120f0daa6c2158de63.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4a30395642062d275e7f4e94ddd412e11adf665301bb61120f0daa6c2158de63.exe
Resource
win10v2004-20230220-en
General
-
Target
4a30395642062d275e7f4e94ddd412e11adf665301bb61120f0daa6c2158de63
-
Size
14.1MB
-
MD5
a6b0b7dc5971259d17c23567f38b6141
-
SHA1
0eac4ddaa9c79a263057fc841cb8fa3f3517e815
-
SHA256
4a30395642062d275e7f4e94ddd412e11adf665301bb61120f0daa6c2158de63
-
SHA512
c91b9340742b8d62242f993c712b57ca0e03651b6c27453d0c83c43fc2755e953232baba78301525b938be4ffd80291d0bd61a9db3b23ea7cf68ba53aa4e7e35
-
SSDEEP
196608:YDKhnzv1Nr7CBQlKPEhJclaL3cGw4Jtnn0sNL0Pb6qi/VmZI1deYeekT8P8yW2dO:pnDniQylKMG5JJXL0P2qivetek4P8RAO
Malware Config
Signatures
Files
-
4a30395642062d275e7f4e94ddd412e11adf665301bb61120f0daa6c2158de63.exe windows x86
feaa154988a1fea4bffe3edb6ad3f0de
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetMalloc
SHBrowseForFolderW
SHGetFileInfoW
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
CommandLineToArgvW
kernel32
FreeLibrary
HeapAlloc
HeapFree
GetProcessHeap
LoadLibraryW
GetLastError
GetProcAddress
CloseHandle
GetCurrentProcess
GetModuleHandleW
GetVersionExW
InitializeCriticalSectionAndSpinCount
GetFileAttributesW
CreateFileW
ExpandEnvironmentStringsW
WaitForSingleObject
GetModuleFileNameW
CreateProcessW
GetCurrentDirectoryW
SetCurrentDirectoryW
LocalFree
SetFileApisToOEM
GetEnvironmentVariableW
SetPriorityClass
GetCurrentThread
SetThreadPriority
GetCommandLineW
CreateDirectoryW
RemoveDirectoryW
FindFirstFileW
FindClose
FindNextFileW
LoadLibraryExW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEndOfFile
SetFileTime
WriteFile
FormatMessageW
InterlockedExchangeAdd
ResumeThread
WideCharToMultiByte
GetACP
MultiByteToWideChar
GetFileSize
ReadFile
GetFullPathNameW
GetTempFileNameW
MoveFileExW
lstrlenW
GetTempPathW
GetLongPathNameW
MoveFileW
GetWindowsDirectoryW
DeleteFileW
SetFileAttributesW
SetEvent
ResetEvent
CreateEventW
FindResourceW
FileTimeToSystemTime
SetFilePointerEx
GetConsoleMode
GetConsoleCP
OutputDebugStringW
LCMapStringW
HeapReAlloc
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
WriteConsoleW
SetStdHandle
FlushFileBuffers
VirtualFree
VirtualAlloc
WaitForMultipleObjects
SetFilePointer
TerminateProcess
Sleep
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapSize
GetModuleHandleExW
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
CreateThread
GetCurrentThreadId
ExitThread
RaiseException
RtlUnwind
ExitProcess
user32
PostQuitMessage
KillTimer
TranslateMessage
IsDialogMessageW
LoadIconW
CreateDialogParamW
IsWindowVisible
EnableWindow
GetMessageW
DestroyIcon
ShowWindow
MessageBoxW
GetWindowRect
PostMessageW
DialogBoxParamW
SetWindowPos
GetSystemMetrics
SetFocus
GetWindowTextW
GetDlgItem
EndDialog
SendMessageW
SetWindowTextW
ScreenToClient
SetTimer
GetDesktopWindow
LoadStringW
DispatchMessageW
IsWindow
gdi32
CreateSolidBrush
DeleteObject
ole32
CoInitialize
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoCreateInstance
Sections
.text Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ