Static task
static1
Behavioral task
behavioral1
Sample
11efaeabc5abae88a9d02ae70f96445b252cbabd5a7fbc4b4c2c7a54684afb43.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11efaeabc5abae88a9d02ae70f96445b252cbabd5a7fbc4b4c2c7a54684afb43.exe
Resource
win10v2004-20220812-en
General
-
Target
11efaeabc5abae88a9d02ae70f96445b252cbabd5a7fbc4b4c2c7a54684afb43
-
Size
365KB
-
MD5
b9e1171d53f68991965ce912076c012c
-
SHA1
9641cefd68cb752ffb42b269188beb015f408765
-
SHA256
11efaeabc5abae88a9d02ae70f96445b252cbabd5a7fbc4b4c2c7a54684afb43
-
SHA512
aca6ef1ef7aa13b629cdd17dae57fbe8edeaf4aa86c580a925a3a1a7d2329e018039d95b0e3b543d86f81ff448a67e7eb87f45263f9cdcbb33384b3d6575fa3b
-
SSDEEP
6144:3X2nBvA+j+4CnpCxAE0KPn7dB9Wc7V6qLJIg8ukjODlGzfcdc+pvsCojHViEosmH:3S5j3CcxR0e7Uc7MOJIP1WGzUdNiCoj+
Malware Config
Signatures
Files
-
11efaeabc5abae88a9d02ae70f96445b252cbabd5a7fbc4b4c2c7a54684afb43.exe windows x86
c91c89a4c97bb57f58d9a8dd3bc00f15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
CloseHandle
ExitThread
GetModuleHandleA
TlsGetValue
FindResourceA
CreateFileA
PulseEvent
SetLastError
GlobalUnlock
DeleteAtom
CreateProcessA
CreateMutexA
GetEnvironmentVariableA
GetACP
FindClose
ReleaseMutex
HeapCreate
GlobalFree
LoadLibraryA
user32
FillRect
CheckRadioButton
DrawEdge
IsWindow
GetIconInfo
GetDlgItem
GetDC
DrawMenuBar
DefWindowProcW
CallWindowProcA
SetFocus
CopyRect
DispatchMessageA
msasn1
ASN1BEREncBool
ASN1BERDecBool
ASN1BERDecCheck
ASN1BERDecNull
ASN1BEREncEoid
dpnet
DirectPlay8Create
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ