Static task
static1
Behavioral task
behavioral1
Sample
83cdb0bd429e86e3cb376c07237857703d1f0774b308b1c6a68a416a6251d627.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83cdb0bd429e86e3cb376c07237857703d1f0774b308b1c6a68a416a6251d627.exe
Resource
win10v2004-20220812-en
General
-
Target
83cdb0bd429e86e3cb376c07237857703d1f0774b308b1c6a68a416a6251d627
-
Size
44KB
-
MD5
70611405505b63fce1e92feedb11ebb0
-
SHA1
601da0b92ee2d969e0e406d8532c3e2619326ed0
-
SHA256
83cdb0bd429e86e3cb376c07237857703d1f0774b308b1c6a68a416a6251d627
-
SHA512
22d394e8fa09dd99625aff4e7d264061c355cf275ffef8c7258b2d5ebef2f68833a8687367df494d4e589213ce06264882bd49613fdc62b9d40f35d91ecc1a3e
-
SSDEEP
384:iCjqvHGmnoq+mC6VNwUKPPxlfosVdz5Pn:vUBobmHVNw3A2lF
Malware Config
Signatures
Files
-
83cdb0bd429e86e3cb376c07237857703d1f0774b308b1c6a68a416a6251d627.exe windows x86
c9b1b3b824f82eccabf250edd718447c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
TlsGetValue
WriteConsoleW
GlobalFree
ReadFile
GetModuleFileNameA
GetCalendarInfoA
GetFileSize
GetModuleHandleA
InitializeCriticalSection
GetCommandLineW
RemoveDirectoryA
VirtualProtectEx
CancelIo
LeaveCriticalSection
DeleteFileA
GetTickCount
GetStartupInfoA
Sleep
CreateDirectoryW
GetConsoleTitleW
lstrlenW
EnterCriticalSection
CloseHandle
CancelIo
user32
PeekMessageA
DispatchMessageA
MessageBoxA
GetSysColor
GetClassInfoA
DestroyMenu
GetWindowLongA
GetWindowLongA
IsWindowVisible
IsWindow
IsWindowEnabled
CreateIcon
wsprintfA
console
CPlApplet
CPlApplet
CPlApplet
CPlApplet
advapi32
RegCloseKey
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE