Static task
static1
Behavioral task
behavioral1
Sample
b46819bb304bd811c4d46836f063958f82379ceb250875aabc295c5bf4bb6772.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b46819bb304bd811c4d46836f063958f82379ceb250875aabc295c5bf4bb6772.exe
Resource
win10v2004-20220812-en
General
-
Target
b46819bb304bd811c4d46836f063958f82379ceb250875aabc295c5bf4bb6772
-
Size
811KB
-
MD5
08992fa4250ccf814dc221498e26fdf5
-
SHA1
4f026325847f183ca6e13ab034d5a2e9827fef7e
-
SHA256
b46819bb304bd811c4d46836f063958f82379ceb250875aabc295c5bf4bb6772
-
SHA512
9e84162b2a82a51c9d3aa2dce43ce3573c0fd26be6a9be00745602b9d6e212632d25026fcff687fc87dd70863b5960b610f9b88586412f8aafe44169b3a744bd
-
SSDEEP
24576:OHS738ZZQ6A8a0W7XKwgV7a/BY99y5HZAk5aFO:OHY3w6b086wgV7ja5AH
Malware Config
Signatures
Files
-
b46819bb304bd811c4d46836f063958f82379ceb250875aabc295c5bf4bb6772.exe windows x86
b2ebede7f632aeb001bc0b61d9ea84ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreW
WriteConsoleA
GetModuleFileNameA
GetFileAttributesW
VirtualProtect
GetTickCount
CloseHandle
GetStartupInfoA
CreateDirectoryW
HeapSize
SetEvent
GetProcessHeap
CreateFileA
GlobalFree
GetFileSize
lstrlenA
SetLastError
SetLocalTime
SetLastError
OpenSemaphoreA
LoadLibraryA
ReadConsoleA
GetEnvironmentStringsA
DeleteFileA
Sleep
user32
IsZoomed
CallWindowProcW
DispatchMessageA
GetSysColor
DestroyMenu
GetWindowLongA
IsWindow
GetClassInfoA
PeekMessageA
DrawTextW
FindWindowA
DispatchMessageA
SetFocus
wups
DllRegisterServer
DllCanUnloadNow
DllUnregisterServer
DllGetClassObject
advapi32
RegCloseKey
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE