Static task
static1
Behavioral task
behavioral1
Sample
4994f19671a006397886ac69602041c5ac0b93bce7fc75eb2031fb6452ce1e61.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4994f19671a006397886ac69602041c5ac0b93bce7fc75eb2031fb6452ce1e61.exe
Resource
win10v2004-20220812-en
General
-
Target
4994f19671a006397886ac69602041c5ac0b93bce7fc75eb2031fb6452ce1e61
-
Size
416KB
-
MD5
667d28b7d478b41d31d8c843e554a26d
-
SHA1
57679528252abad33a6e76fdaa2965e3946bc7fe
-
SHA256
4994f19671a006397886ac69602041c5ac0b93bce7fc75eb2031fb6452ce1e61
-
SHA512
1c279af74a3c70965ac1d51f7d395c65a16134b8474f0cfefd7ee685bfbd30ba8b0226391cc4dccf9c623a1dcc7f065133e3ddad5f24f78a5eabee1c5a0d71e8
-
SSDEEP
12288:5gx0g9tTe+tQmqelgczlFbbi68nnmh0d4c:q0gftXqelg6Lbqmad4c
Malware Config
Signatures
Files
-
4994f19671a006397886ac69602041c5ac0b93bce7fc75eb2031fb6452ce1e61.exe windows x86
219113f8e997d8f8b41a98f6a7bf7592
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetLocalTime
CreatePipe
CreateDirectoryA
VirtualProtect
ResumeThread
ReadConsoleW
DeleteFileA
GlobalSize
GetStdHandle
GetModuleHandleA
GetFileAttributesA
WriteFile
GetLocaleInfoA
ResumeThread
SuspendThread
GetCommandLineA
HeapSize
IsBadReadPtr
GetPriorityClass
GetProcessHeap
GetDriveTypeA
user32
DestroyMenu
LoadCursorA
GetMessageA
GetWindowLongA
wsprintfA
DestroyIcon
DispatchMessageA
SetRect
GetWindowTextW
PeekMessageA
SetCursor
DrawIcon
GetWindowLongA
els
DllRegisterServer
DllUnregisterServer
DllGetClassObject
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 410KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE