Static task
static1
Behavioral task
behavioral1
Sample
b51a80b1e8a0e6273ae23d9ea335ae028d666e1d7667fbf78c6f5dd186bc9977.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b51a80b1e8a0e6273ae23d9ea335ae028d666e1d7667fbf78c6f5dd186bc9977.exe
Resource
win10v2004-20220812-en
General
-
Target
b51a80b1e8a0e6273ae23d9ea335ae028d666e1d7667fbf78c6f5dd186bc9977
-
Size
414KB
-
MD5
21e229e8e800f64488b744573e243330
-
SHA1
be76ec42980ff83c53756655f88983507eec11d9
-
SHA256
b51a80b1e8a0e6273ae23d9ea335ae028d666e1d7667fbf78c6f5dd186bc9977
-
SHA512
9268fa6f1b3228f8ae2978d9430e917e6fc51063ebf3c90efdfaec0e7ee4f4998832b2cf3686c86339e37a3aa373b2e78d6c8814594c53578d9804490eec235e
-
SSDEEP
12288:Bpg9tTe+tQmqelgczlFbbi68nnmh0d4c:TgftXqelg6Lbqmad4c
Malware Config
Signatures
Files
-
b51a80b1e8a0e6273ae23d9ea335ae028d666e1d7667fbf78c6f5dd186bc9977.exe windows x86
59ba0c30af6954c09c30e969d2d0817c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetFileAttributesA
GetCommandLineA
WriteFile
CreatePipe
ResumeThread
VirtualProtect
GetDriveTypeA
CreateDirectoryA
SetLocalTime
SuspendThread
IsBadReadPtr
GetPriorityClass
ResumeThread
GlobalSize
GetModuleHandleA
ReadConsoleW
DeleteFileA
GetLocaleInfoA
GetStdHandle
HeapSize
GetProcessHeap
user32
PeekMessageA
GetWindowLongA
GetMessageA
SetRect
GetWindowTextW
DispatchMessageA
SetCursor
wsprintfA
SetFocus
GetWindowLongA
DrawIcon
DestroyMenu
LoadCursorA
els
DllRegisterServer
DllRegisterServer
DllGetClassObject
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 408KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE