Static task
static1
Behavioral task
behavioral1
Sample
4ebe9dcc418bafc9ee1f197a6c9bdc9553c5bee452d938a7a797e01183458492.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4ebe9dcc418bafc9ee1f197a6c9bdc9553c5bee452d938a7a797e01183458492.exe
Resource
win10v2004-20220812-en
General
-
Target
4ebe9dcc418bafc9ee1f197a6c9bdc9553c5bee452d938a7a797e01183458492
-
Size
720KB
-
MD5
67a4af88e87c5f30a07bae01e46272b0
-
SHA1
899fd7a3ab791e629b1942825536581cfc780eca
-
SHA256
4ebe9dcc418bafc9ee1f197a6c9bdc9553c5bee452d938a7a797e01183458492
-
SHA512
2d13f4c6b7878de33bea46b2d34e395a3d42aacd97a5d9f4541b3967f8a985fc208863a40665f10fdbf3f5a31bda49119289bf675a3caddbc3df0d37b9c3a2c1
-
SSDEEP
12288:JURMnA0GDsM35mE6rMY0aEOiPUpeUkT+lYlpN73l+QFenlynJtRc3a2JDSppf:JURMA05Ub0502iPUpemlE7VT8QnJtRcu
Malware Config
Signatures
Files
-
4ebe9dcc418bafc9ee1f197a6c9bdc9553c5bee452d938a7a797e01183458492.exe windows x86
b8652542b8e59fec47f0c3d36d7fb12e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
GetCurrentProcessId
GetCurrentThreadId
InitializeCriticalSection
CreateEventW
FindClose
GetEnvironmentVariableW
TlsGetValue
LocalFlags
HeapCreate
WriteFile
GetNumberFormatA
FindAtomA
LoadLibraryW
GetDriveTypeW
lstrlenW
SuspendThread
LocalFree
GetPrivateProfileStringA
GetConsoleAliasA
user32
DispatchMessageA
CallWindowProcW
GetClassInfoA
GetKeyboardType
GetSysColor
IsWindow
DrawStateW
EndDialog
GetClientRect
GetSysColor
SetFocus
DrawTextA
CreateWindowExA
srclient
EnableSR
EnableSR
EnableSR
EnableSR
EnableSR
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 732KB - Virtual size: 731KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ