Static task
static1
Behavioral task
behavioral1
Sample
b4ebe61e97ba7d46ede4ea1060c231fb1d5b8047e97221530154c2e339a8a248.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b4ebe61e97ba7d46ede4ea1060c231fb1d5b8047e97221530154c2e339a8a248.exe
Resource
win10v2004-20220812-en
General
-
Target
b4ebe61e97ba7d46ede4ea1060c231fb1d5b8047e97221530154c2e339a8a248
-
Size
145KB
-
MD5
08d1be0d52835340c46c384df92243a0
-
SHA1
449fc0fd383ad763174e77c43efa06217bc09a08
-
SHA256
b4ebe61e97ba7d46ede4ea1060c231fb1d5b8047e97221530154c2e339a8a248
-
SHA512
6a668ce684b9b612c26ebd1387461032c528893e2d78ddd4eebe64b6bb381f8330bf93ee4e40e06b17eec3c0e923c18ce054acaa1c870fab1bac994ab3284486
-
SSDEEP
3072:O5fkL45mBFZch9YWwid0dXNp3nNQmpQ84xpuywz10JthT:OlkL451h9nW3n+myHfa2
Malware Config
Signatures
Files
-
b4ebe61e97ba7d46ede4ea1060c231fb1d5b8047e97221530154c2e339a8a248.exe windows x86
94431eff5c3774cbf5f16fdf422a1572
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesExA
GetLastError
GetModuleHandleA
GetProcAddress
CloseHandle
GetTempPathA
GetTickCount
RtlUnwind
GetModuleHandleW
lstrcatW
GetCurrentProcessId
lstrlenW
GetVersionExW
LoadLibraryExW
SetLastError
GetCommandLineW
MultiByteToWideChar
LoadLibraryW
FreeLibrary
LocalFree
FindFirstFileW
LocalAlloc
FormatMessageW
FindNextFileW
GetFileAttributesW
crtdll
__GetMainArgs
exit
raise
signal
wbemcomn
?DebugTrace@@YAHDPBDZZ
ole32
CoCreateInstance
CoUninitialize
winsta
WinStationEnumerateW
user32
LoadStringW
ntdll
wcscpy
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 131KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idat Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 382B - Virtual size: 382B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ