Static task
static1
Behavioral task
behavioral1
Sample
3068e348477afe97fa5b10ce9abbe41c2fa5187ef8d45228e4c3299848f838cb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3068e348477afe97fa5b10ce9abbe41c2fa5187ef8d45228e4c3299848f838cb.exe
Resource
win10v2004-20220812-en
General
-
Target
3068e348477afe97fa5b10ce9abbe41c2fa5187ef8d45228e4c3299848f838cb
-
Size
370KB
-
MD5
6d6eb008daff5afe8cdfa5fdd4a6d703
-
SHA1
4d0b3a18fd029b25bb1ddacc6d5bb76a8fb2facc
-
SHA256
3068e348477afe97fa5b10ce9abbe41c2fa5187ef8d45228e4c3299848f838cb
-
SHA512
913f9c6772007faf12cc239b3018f253d08b24fce58b8d1bb47ff136da7b55a479b3891dda873cbab353f96c0642632f90d41c79c2891106080f9e099408ebfb
-
SSDEEP
6144:N3NJcGyC2Cy8fumy5UGR6go/pnGSBR0HfYHkImafR7pgXcHBf5NUpY/HzERKK:N552CFumQUGQgoRGM0HfYAkRZd5mW/Hg
Malware Config
Signatures
Files
-
3068e348477afe97fa5b10ce9abbe41c2fa5187ef8d45228e4c3299848f838cb.exe windows x86
f37f1cd0c96fa325001c2ac7e30ad7e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
lstrlenA
CloseHandle
CreateFileW
LocalSize
GetMailslotInfo
LocalFree
FindVolumeClose
ReleaseMutex
InterlockedExchange
GetCurrentThreadId
GetPrivateProfileIntW
GetDriveTypeW
GlobalFree
FreeConsole
VirtualAlloc
GetModuleHandleW
ResetEvent
GetExitCodeProcess
ReadFile
user32
IsIconic
DispatchMessageA
CreateWindowExA
GetSysColor
GetDlgItem
SetFocus
GetClientRect
DrawStateW
GetMenu
CallWindowProcW
GetClassInfoA
GetCursorInfo
EndDialog
dsprop
CheckADsError
CheckADsError
ReportError
CheckADsError
CheckADsError
desk.cpl
InstallScreenSaverW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ