Static task
static1
Behavioral task
behavioral1
Sample
39cf62bbea9b0c4f9451e0b368b2dd3358e6f76ba788c101d64db6a39fc101cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39cf62bbea9b0c4f9451e0b368b2dd3358e6f76ba788c101d64db6a39fc101cc.exe
Resource
win10v2004-20220812-en
General
-
Target
39cf62bbea9b0c4f9451e0b368b2dd3358e6f76ba788c101d64db6a39fc101cc
-
Size
355KB
-
MD5
70f4af92c66f7968ada6bb970e98c178
-
SHA1
86cf2f44ca4c5be1a56a9ecefd52644da5e74b2e
-
SHA256
39cf62bbea9b0c4f9451e0b368b2dd3358e6f76ba788c101d64db6a39fc101cc
-
SHA512
47869f6c139199ba57d2b8d48d3e524c8a340eac40f7405310e55d83051901bfc44ccac7d890240a5f43c4bea77f16b7996a5b3c3b9d987e2e9ab98c36cf540e
-
SSDEEP
6144:aUHxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVV2Ir:aUR9QI0Ay6fYvzEOe2KNSQ6l83zBzsu+
Malware Config
Signatures
Files
-
39cf62bbea9b0c4f9451e0b368b2dd3358e6f76ba788c101d64db6a39fc101cc.exe windows x86
8cc4eee8159c9bfe81fb9f0d3f5d8bcd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
ResumeThread
GetPrivateProfileIntA
lstrlenA
GetTickCount
CloseHandle
ResetEvent
SuspendThread
CreateFileA
FindAtomW
VirtualAlloc
LoadLibraryA
GetDiskFreeSpaceW
ExitProcess
GetComputerNameW
LocalFree
GetFileAttributesA
GetSystemTime
GetCommandLineW
GetModuleHandleW
user32
FillRect
CreateWindowExA
GetMenu
GetDlgItem
GetClientRect
DrawStateA
GetCaretPos
CallWindowProcA
GetClassInfoA
DispatchMessageA
DestroyCaret
CloseWindow
EndDialog
rasapi32
RasDeleteEntryA
DwEnumEntryDetails
DwCloneEntry
RasDialA
DwRasUninitialize
adsnt
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ