Static task
static1
Behavioral task
behavioral1
Sample
566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c.exe
Resource
win10v2004-20220721-en
General
-
Target
566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c
-
Size
305KB
-
MD5
51537b5808ea847e1959f46a6f5ea4f0
-
SHA1
6ee4d5f8fc6004b280cb61b111dedf2e77d6e515
-
SHA256
566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c
-
SHA512
5d7d9d539b5700dddcd31267e1e028bbd094d6536d6bf38311c38a720a338469b76f61783d3ac8d962a871b0651b36534ae10b7c664cb8731b76de21c3ee5b6a
-
SSDEEP
6144:XV+Ur7/fKKffKjssP6R2iPKNU1P/lhtysXr6vY66KbZ34:XVNrH0SRfPqUN/lj7PTIZ4
Malware Config
Signatures
Files
-
566e7516bcf131afa1b7c4b9374adda4f248b31811dace4757f3d36226553e0c.exe windows x86
a7a033ec9e3ef630e1eb060ca2283c33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexW
GetEnvironmentVariableA
SuspendThread
ResetEvent
GetTickCount
ReleaseMutex
AddAtomA
HeapDestroy
CreateFileA
HeapCreate
FindClose
HeapSize
SetLastError
WaitForSingleObject
GetModuleHandleA
DeleteFileA
GetProfileIntW
CloseHandle
GetCurrentDirectoryA
GetFileSize
InitializeCriticalSection
ExitProcess
SetEndOfFile
GetTickCount
GetStartupInfoW
shell32
SHFree
SHGetMalloc
DragFinish
StrChrA
ShellMessageBoxA
DuplicateIcon
SHGetSettings
DragAcceptFiles
SHGetDiskFreeSpaceA
ExtractIconA
DragQueryFileA
ShellAboutA
DllUnregisterServer
dpmodemx
SPInit
SPInit
SPInit
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ