Static task
static1
Behavioral task
behavioral1
Sample
7af1ee1e4e98046a68450e777c4750e31321fcc58cb0456b70968d97503f6299.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7af1ee1e4e98046a68450e777c4750e31321fcc58cb0456b70968d97503f6299.exe
Resource
win10v2004-20220901-en
General
-
Target
7af1ee1e4e98046a68450e777c4750e31321fcc58cb0456b70968d97503f6299
-
Size
305KB
-
MD5
94f8469d844914f4351b7e3b7a8141f2
-
SHA1
3591585adf2712941c4f21dec2ed178f7cdfb1db
-
SHA256
7af1ee1e4e98046a68450e777c4750e31321fcc58cb0456b70968d97503f6299
-
SHA512
2b4812d1fa6175f796790ac863be0bedd6960a298b1b0dafe752922c40702fc29c5ac5f482c936ed4569276ba1c4a58aed6917009c2585f561d066eea1d4339f
-
SSDEEP
6144:hHcbBx/WhCy7lE/WZa+VEKt0qtrGu3OSDQcEkkcrBUHC7urn9SW4ROo:h8B4hkWZakRt0qUYBL52EuZSnRZ
Malware Config
Signatures
Files
-
7af1ee1e4e98046a68450e777c4750e31321fcc58cb0456b70968d97503f6299.exe windows x86
a8ce8416e92dbf62072d347f5d44b282
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasW
GetCurrentProcessId
SetLastError
LocalFree
ReadFile
CreateEventW
FindClose
GetDriveTypeW
HeapCreate
GetCurrentThreadId
EnterCriticalSection
GetModuleHandleA
FindAtomW
TlsGetValue
EnumCalendarInfoW
GetPrivateProfileStringW
lstrlenW
SetEvent
GetNumberFormatW
ResumeThread
user32
GetSysColor
GetCursorInfo
GetClassInfoA
GetClientRect
GetMenuInfo
GetKeyboardType
SetFocus
DrawTextA
DispatchMessageA
GetKeyState
CallWindowProcW
IsWindow
DispatchMessageA
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ