Static task
static1
Behavioral task
behavioral1
Sample
b1ee26149939f2880cb3867da80e4745027ffe878425e216d37feaf16898729f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b1ee26149939f2880cb3867da80e4745027ffe878425e216d37feaf16898729f.exe
Resource
win10v2004-20220901-en
General
-
Target
b1ee26149939f2880cb3867da80e4745027ffe878425e216d37feaf16898729f
-
Size
217KB
-
MD5
6e7ac1e5d0d44b93afffd663e2825390
-
SHA1
abee672ed936c221d066eedb735fbd2f2cde77ba
-
SHA256
b1ee26149939f2880cb3867da80e4745027ffe878425e216d37feaf16898729f
-
SHA512
897391ea940cd44b90fcf2fbc0ebd201d66581e46ddc33baa186b1ab189e16acd566da85013f8794a26f09d3817ecb741fe5313e86ae89d829c98cd66fe75523
-
SSDEEP
3072:vjNBSrod9CIF9IOXBj8F4fCmT/QY9akFaLTXlyieaBnyDOEMDELD2XSz3N6eS0g7:vX5jF73fCuHYpjlrBnJAD2XEN6er3qg6
Malware Config
Signatures
Files
-
b1ee26149939f2880cb3867da80e4745027ffe878425e216d37feaf16898729f.exe windows x86
c5f1e2c930cbbf7abd56f59541a0868a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleHandleW
lstrcpyW
CloseHandle
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetLastError
GetCommandLineW
lstrlenW
CreateFileW
GetVersionExW
user32
RegisterClassW
GetActiveWindow
SetWindowLongW
LoadStringW
SendMessageW
wsprintfW
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 208B - Virtual size: 208B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 409B - Virtual size: 409B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE