Static task
static1
Behavioral task
behavioral1
Sample
4b50bcf85f8bbb2066ddf4cdf5ad536894303d59661a2c309cd28deb8c762211.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b50bcf85f8bbb2066ddf4cdf5ad536894303d59661a2c309cd28deb8c762211.exe
Resource
win10v2004-20220812-en
General
-
Target
4b50bcf85f8bbb2066ddf4cdf5ad536894303d59661a2c309cd28deb8c762211
-
Size
359KB
-
MD5
8ff94e264fa4f91783eea72570917d30
-
SHA1
b215870698d7c8a9f38700573aff7a38e8ac5d6f
-
SHA256
4b50bcf85f8bbb2066ddf4cdf5ad536894303d59661a2c309cd28deb8c762211
-
SHA512
602ee19c841e4d1a56c26cbfad9ee430ea8fcc95b30ee79ffdaa59de2560804672a7fd5e09b9e2008e2a61285fb282b4c5d0ccbed5b96ac4e2b8337ba0da9f37
-
SSDEEP
6144:MdHxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVV2Ir:MdR9QI0Ay6fYvzEOe2KNSQ6l83zBzsu+
Malware Config
Signatures
Files
-
4b50bcf85f8bbb2066ddf4cdf5ad536894303d59661a2c309cd28deb8c762211.exe windows x86
7703b11ef5517fd345afbb299fcab1a8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetDriveTypeA
GetTickCount
GetComputerNameW
HeapCreate
GetFileAttributesA
FindAtomW
LocalFree
lstrlenA
GetTickCount
ReleaseMutex
GetCommandLineW
ExitProcess
CreateFileA
ResetEvent
ReleaseMutex
CloseHandle
LoadLibraryA
GetSystemTime
GetDiskFreeSpaceW
user32
DispatchMessageA
FillRect
DestroyCaret
GetClassInfoA
CreateWindowExA
GetDlgItem
GetMenu
CloseWindow
DrawStateA
CallWindowProcA
EndDialog
GetComboBoxInfo
GetCaretPos
rasapi32
RasDeleteEntryA
DwEnumEntryDetails
RasDialA
DwCloneEntry
DwRasUninitialize
modemui
CountryRunOnce
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ