Static task
static1
Behavioral task
behavioral1
Sample
39787ba399fe035805312a8f349b7a0f56c2483131c41f5a434fbd42d59d2de3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
39787ba399fe035805312a8f349b7a0f56c2483131c41f5a434fbd42d59d2de3.exe
Resource
win10v2004-20220812-en
General
-
Target
39787ba399fe035805312a8f349b7a0f56c2483131c41f5a434fbd42d59d2de3
-
Size
851KB
-
MD5
761044b52aba28e43fd8b18e0061ea80
-
SHA1
8596d5ecb5df81c63313246508647384cb5a30cc
-
SHA256
39787ba399fe035805312a8f349b7a0f56c2483131c41f5a434fbd42d59d2de3
-
SHA512
e672df61617148d15936852135222e34894be5357bee1ac71d550c43b4e8dc89bd19ad5b83c461a361f16be777feb3366d8dc433d3ce654cfccdf9d1bb1b8f57
-
SSDEEP
24576:2c0K5P3ikLT82onRY/aXJuITPpOCJ6IUxpzd9:2c043ikLLonW/tGPgCJ69xRb
Malware Config
Signatures
Files
-
39787ba399fe035805312a8f349b7a0f56c2483131c41f5a434fbd42d59d2de3.exe windows x86
f64154d770866d8bdb51ae5c46a246d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMailslotW
GetPriorityClass
GetFileAttributesA
FindAtomA
SuspendThread
ReadFile
GetStdHandle
DeleteFileA
GetCurrentProcessId
GetCommandLineA
HeapDestroy
GetEnvironmentVariableA
IsBadCodePtr
GetModuleFileNameA
GetProcessTimes
GetStartupInfoA
CloseHandle
GetModuleHandleA
DeleteAtom
HeapCreate
user32
DestroyMenu
GetClientRect
DispatchMessageA
DrawTextW
GetWindowInfo
GetWindowLongA
GetSysColor
IsZoomed
SetFocus
GetKeyState
GetClassInfoA
CallWindowProcW
DispatchMessageA
DestroyMenu
msctfp
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 843KB - Virtual size: 842KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ