Static task
static1
Behavioral task
behavioral1
Sample
017054ca2ae3686e6016e6b511499adcdf30d2d6af1cea160ed40df049c9fa85.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
017054ca2ae3686e6016e6b511499adcdf30d2d6af1cea160ed40df049c9fa85.exe
Resource
win10v2004-20220812-en
General
-
Target
017054ca2ae3686e6016e6b511499adcdf30d2d6af1cea160ed40df049c9fa85
-
Size
416KB
-
MD5
09be2d8f6b4e918a2175e9c0be63baba
-
SHA1
1d161daa5fa6e162c21fbdf3f4e724f9afd4ff23
-
SHA256
017054ca2ae3686e6016e6b511499adcdf30d2d6af1cea160ed40df049c9fa85
-
SHA512
4b81b2287cadc53266db854d478077f3f5fdd5ed55ecd109f5bc41957fe155d35e3f4ae0c3d18f3a72a3e82cda85aad7951668a366c65417f765da1374a7ebb3
-
SSDEEP
6144:Yfnd3smVkN8SaS2v8KvMftToF1r4UJucx0fQtmya8o2b8UIedOFB57DXVzwl:inVTkNkVhkkuK2Qtm98oQ8wUDXVzwl
Malware Config
Signatures
Files
-
017054ca2ae3686e6016e6b511499adcdf30d2d6af1cea160ed40df049c9fa85.exe windows x86
cbb6cb74e1087f042ebac868f6aec994
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomA
GetProcessHeap
CloseHandle
ReleaseMutex
GetFileAttributesW
HeapCreate
GetLocalTime
GetComputerNameW
LocalFree
GetDriveTypeA
ReleaseMutex
SetEvent
GetTickCount
ExitThread
GetDiskFreeSpaceW
CreateFileA
lstrcpynA
LoadLibraryA
LoadLibraryW
GetCommandLineW
user32
GetDlgItem
CloseWindow
CallWindowProcA
GetComboBoxInfo
SetFocus
FillRect
GetClipCursor
DispatchMessageA
GetClassInfoA
DestroyCaret
DrawStateA
CreateWindowExA
GetKeyState
snmpapi
SnmpUtilMemAlloc
SnmpUtilMemFree
SnmpTfxQuery
SnmpTfxClose
SnmpTfxOpen
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 336KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 404KB - Virtual size: 403KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ