Static task
static1
Behavioral task
behavioral1
Sample
16d0c4924969f12a2bc14b020e112c374a1987a5057384ecf749391c3186f7c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
16d0c4924969f12a2bc14b020e112c374a1987a5057384ecf749391c3186f7c7.exe
Resource
win10v2004-20220812-en
General
-
Target
16d0c4924969f12a2bc14b020e112c374a1987a5057384ecf749391c3186f7c7
-
Size
170KB
-
MD5
0e6c2f6e82d36cdadcc92f3473f6e7ef
-
SHA1
27ba39bad6a7dd9e5d3c4ee06b60e16d3ed37699
-
SHA256
16d0c4924969f12a2bc14b020e112c374a1987a5057384ecf749391c3186f7c7
-
SHA512
43cde29c1d02b29ccef598ccf26f91b990226fa884ada6ea9598baef4674022a6bce2685ee3244c7024a8a3c5d1c8bf843fc31dd5e05453fb526ce631426a7f5
-
SSDEEP
3072:LgXhbrAW6K1ZQd3QhM5Zw8o8JO7GEd15viBbLTVLmF3HP8MTwVHlC:OxrqKPQdwEw8o8J/ObvobtLmF3HPbQlC
Malware Config
Signatures
Files
-
16d0c4924969f12a2bc14b020e112c374a1987a5057384ecf749391c3186f7c7.exe windows x86
240bdc2a82755040fc16ef59ed417bea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
VirtualProtectEx
GlobalUnlock
EnumResourceTypesW
GetConsoleTitleA
lstrlenA
GetModuleHandleA
IsBadReadPtr
IsDebuggerPresent
GlobalLock
LoadLibraryExW
GetSystemTime
CreateEventA
GetStdHandle
CloseHandle
FindClose
FreeConsole
CreateMutexA
LocalFree
CancelIo
user32
IsIconic
GetSubMenu
IsMenu
GetKeyState
LoadCursorA
DialogBoxParamA
CreateWindowExA
GetMessageA
GetMessageA
EnumWindows
GetDlgItemTextA
EndDialog
GetParent
MessageBoxA
clbcatq
SetSetupOpen
ComPlusMigrate
GetComputerObject
GetCatalogObject
CheckMemoryGates
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ