Static task
static1
Behavioral task
behavioral1
Sample
8d497f3d9dd7a3320441520a608a4caf2872ed8442f4cf8e7050870e6b9710eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8d497f3d9dd7a3320441520a608a4caf2872ed8442f4cf8e7050870e6b9710eb.exe
Resource
win10v2004-20220901-en
General
-
Target
8d497f3d9dd7a3320441520a608a4caf2872ed8442f4cf8e7050870e6b9710eb
-
Size
304KB
-
MD5
5cbcd0700ac792bd4ede149014e21a70
-
SHA1
0258e922a172f5a0e9fc961497c925d67142351b
-
SHA256
8d497f3d9dd7a3320441520a608a4caf2872ed8442f4cf8e7050870e6b9710eb
-
SHA512
de8884d1f1c202c7be4e3d93e20a5c1c8057645805ac966bdfe3176603b4218b8c393f32bf820c336aada14f43c610bc867dea5a6d05991f226eb853ce0fb070
-
SSDEEP
6144:lHMzbmRUR4XgmXslrTrgEmLt6G0bw0emefGueCyL:yL4XaPrgE0UGWypfyCy
Malware Config
Signatures
Files
-
8d497f3d9dd7a3320441520a608a4caf2872ed8442f4cf8e7050870e6b9710eb.exe windows x86
00350dbef5f45b6e318c9c85bb4b0c87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ResumeThread
WriteFile
GetModuleHandleA
ResumeThread
GetPriorityClass
GlobalSize
DeleteFileA
GetLocaleInfoA
GetFileAttributesA
SuspendThread
CreateDirectoryA
GetDriveTypeA
GetProcessHeap
VirtualProtect
GetCommandLineA
ReadConsoleW
CreatePipe
HeapSize
SetLocalTime
GetStdHandle
IsBadReadPtr
user32
LoadCursorA
SetCursor
wsprintfA
DestroyMenu
DrawIcon
PeekMessageA
GetCaretPos
GetWindowLongW
GetWindowTextW
DispatchMessageA
GetMessageA
SetFocus
GetCapture
els
DllGetClassObject
DllGetClassObject
DllRegisterServer
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE