Static task
static1
Behavioral task
behavioral1
Sample
53f4a1df56291bd3c6c917fad13ee4080bada80a4a11df6bdf9169191b90099c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53f4a1df56291bd3c6c917fad13ee4080bada80a4a11df6bdf9169191b90099c.exe
Resource
win10v2004-20220812-en
General
-
Target
53f4a1df56291bd3c6c917fad13ee4080bada80a4a11df6bdf9169191b90099c
-
Size
498KB
-
MD5
b206f358cdadc656cf8c7ad006f18781
-
SHA1
ce283691650b4d02068eebcfe9f46d7e03b0c0c5
-
SHA256
53f4a1df56291bd3c6c917fad13ee4080bada80a4a11df6bdf9169191b90099c
-
SHA512
284fcd17e644c88a6e28c03d6a542b30019ab94255c8fdf2506b1a6c61678474dfa046cd0865e325fe166e0841ba137bf121146399ab8d9e887c7a96a71509fb
-
SSDEEP
6144:QzhKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDk:QzhqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
53f4a1df56291bd3c6c917fad13ee4080bada80a4a11df6bdf9169191b90099c.exe windows x86
b8be49e31a9da8aff972d5afaa5b3586
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
IsBadStringPtrW
SuspendThread
GetModuleHandleA
GetFileAttributesA
lstrlenA
PulseEvent
DeleteFileA
GetDriveTypeA
GetStartupInfoA
CreateFileMappingA
ReleaseMutex
TlsGetValue
Sleep
IsDebuggerPresent
HeapCreate
DeviceIoControl
GetCommandLineA
CreateFileA
TlsAlloc
user32
DispatchMessageA
PeekMessageA
LoadImageA
GetWindowLongA
IsZoomed
DestroyWindow
DrawTextW
FindWindowW
GetIconInfo
CallWindowProcW
IsWindow
DispatchMessageA
DestroyMenu
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ