Static task
static1
Behavioral task
behavioral1
Sample
04b8a81f7cb8b7ff6c0f805e049007302b17968ffba224b1508a7585ba4d0218.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
04b8a81f7cb8b7ff6c0f805e049007302b17968ffba224b1508a7585ba4d0218.exe
Resource
win10v2004-20220812-en
General
-
Target
04b8a81f7cb8b7ff6c0f805e049007302b17968ffba224b1508a7585ba4d0218
-
Size
252KB
-
MD5
63c7a8bdfca69f523898559ba3b15620
-
SHA1
d66db05a06be86180c8c9b940e1c4a3d354825d4
-
SHA256
04b8a81f7cb8b7ff6c0f805e049007302b17968ffba224b1508a7585ba4d0218
-
SHA512
62950a473c294cde48744e43d96c03882af3945c33ac33b29ebecbe7d63b99f20f774e66588f3f0f236003d52e9a7ac19515d2dca4ad2f22a98bd3d2995e5429
-
SSDEEP
3072:Cbp5az40zjMFi75yfAXF7Ivj101E7wPOdd5NwCOEcynilo7Ce6BuMrtFPYxhYHzX:aHmMFeyfqMuj2drNDUP5rtFwx2H6Ox
Malware Config
Signatures
Files
-
04b8a81f7cb8b7ff6c0f805e049007302b17968ffba224b1508a7585ba4d0218.exe windows x86
69c645b4bfe60d4376138ebe19ca6171
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringA
GetUserDefaultLCID
OpenFile
CreateDirectoryExA
IsValidLocale
PurgeComm
GetPrivateProfileStringW
ReadConsoleA
DeleteFiber
LocalAlloc
GetLongPathNameA
WritePrivateProfileSectionA
GetPrivateProfileStringA
CreateDirectoryA
GlobalReAlloc
SuspendThread
GetTempFileNameA
GetProfileIntA
GetSystemDirectoryW
GetLargestConsoleWindowSize
FreeEnvironmentStringsA
GetCurrentProcessId
GetHandleInformation
SetTimeZoneInformation
_lopen
CompareStringA
TlsGetValue
GetTapeStatus
PeekConsoleInputW
CreatePipe
GlobalFindAtomW
SetEndOfFile
WritePrivateProfileStringW
GetCurrentDirectoryW
Beep
SetSystemTime
WritePrivateProfileStringA
GetTempPathW
GetCommConfig
MoveFileW
SetThreadLocale
CreateNamedPipeW
GlobalDeleteAtom
GetCurrentProcess
VirtualProtect
CreateFileW
RaiseException
FlushConsoleInputBuffer
VirtualUnlock
CancelIo
LocalSize
EnumTimeFormatsW
_lclose
GetAtomNameA
LCMapStringA
GetConsoleCursorInfo
GetCommandLineA
lstrlenA
VirtualAlloc
SetConsoleOutputCP
ExitProcess
user32
GrayStringA
DrawCaption
EnumWindowStationsW
GetClassNameW
CloseDesktop
RegisterClassA
CreateCaret
SetMenuItemInfoW
GetKeyNameTextA
GetScrollInfo
SetUserObjectSecurity
gdi32
SetColorAdjustment
UnrealizeObject
EnumFontFamiliesExW
SetPixelFormat
GetEnhMetaFileHeader
AddFontResourceW
SetBrushOrgEx
GetSystemPaletteEntries
StartDocW
RoundRect
ExtTextOutW
comdlg32
GetOpenFileNameW
ChooseFontA
ReplaceTextA
GetSaveFileNameW
advapi32
RegCreateKeyExW
shell32
SHBrowseForFolderA
ole32
CoReleaseServerProcess
OleGetIconOfClass
ReadFmtUserTypeStg
CoFreeAllLibraries
IIDFromString
ReadClassStg
OleSetContainedObject
CoRegisterClassObject
ReadClassStm
oleaut32
SafeArrayRedim
SafeArrayPutElement
LoadTypeLi
SafeArrayCreate
VariantChangeType
SysAllocStringLen
comctl32
ImageList_DrawIndirect
shlwapi
PathRenameExtensionW
StrCmpNIW
PathRemoveFileSpecA
PathIsRootW
PathIsDirectoryA
SHDeleteValueW
PathRemoveBackslashW
wnsprintfW
PathIsSameRootW
Sections
.text Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE