Static task
static1
Behavioral task
behavioral1
Sample
7abd7ea4a93c7afec232b6d44b60e50e667ade69f2f57875047ee0a9734eca44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7abd7ea4a93c7afec232b6d44b60e50e667ade69f2f57875047ee0a9734eca44.exe
Resource
win10v2004-20220812-en
General
-
Target
7abd7ea4a93c7afec232b6d44b60e50e667ade69f2f57875047ee0a9734eca44
-
Size
109KB
-
MD5
6bb83e23c8c0030a726d460e061fa3e1
-
SHA1
b65b4ecd0a2ce1abf0535aa7a93fc457c2c9efc7
-
SHA256
7abd7ea4a93c7afec232b6d44b60e50e667ade69f2f57875047ee0a9734eca44
-
SHA512
46dc65a151649212a309cac58686ba44f50f4fd779587bce7126aeaa9f035d932e73edd642864c781d5e84f2dfb0d5395d2a8fb9a88a437370513b012f10598b
-
SSDEEP
3072:x5/z52vMbwHDf56x2i7IZStp4btWQUZLL:vd2KysaSAE
Malware Config
Signatures
Files
-
7abd7ea4a93c7afec232b6d44b60e50e667ade69f2f57875047ee0a9734eca44.exe windows x86
38c71ea50a8270c14f99eca8f0368b05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasA
GetCurrentProcessId
LocalFlags
lstrlenW
ReadFile
GetPrivateProfileStringA
EnumCalendarInfoA
SetLastError
CreateEventW
GetModuleHandleA
FindClose
HeapCreate
EnterCriticalSection
LocalFree
ResumeThread
TlsGetValue
GetCurrentThreadId
GetNumberFormatA
GetDriveTypeW
FindAtomA
user32
DrawTextA
GetMenuInfo
GetKeyboardType
SetFocus
CallWindowProcW
GetKeyState
GetSysColor
IsWindow
GetClientRect
GetCursorInfo
DispatchMessageA
GetClassInfoA
DispatchMessageA
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ