Static task
static1
Behavioral task
behavioral1
Sample
2217502394bfe84785a2287aef6693514c2e261f3cadfcfdf85b5c001ab062d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2217502394bfe84785a2287aef6693514c2e261f3cadfcfdf85b5c001ab062d3.exe
Resource
win10v2004-20220812-en
General
-
Target
2217502394bfe84785a2287aef6693514c2e261f3cadfcfdf85b5c001ab062d3
-
Size
814KB
-
MD5
6565ca47b3ef63a40c8621c99c19a010
-
SHA1
1316c56f48c8e8fd0427939dea5db6736fa57a68
-
SHA256
2217502394bfe84785a2287aef6693514c2e261f3cadfcfdf85b5c001ab062d3
-
SHA512
ebdee2da4bfa409a1cdf9114fd3b380d4d9cb12948e77a9f343e9bcff2c2b7a0a977d1c24cee5e5ce8094bec1dee1e7822638a527144cd14c54b2d5218a1a6ee
-
SSDEEP
12288:DhJgRJlDKfo9NbtOR34Y3cDd3pVifNZvudzA038Qv9yhW3kAWg3XscQLjO:lJgvlySvOR3mpTifNZvudz9QVtGccI
Malware Config
Signatures
Files
-
2217502394bfe84785a2287aef6693514c2e261f3cadfcfdf85b5c001ab062d3.exe windows x86
40a0fe99f69bdc3328e2f95ad192b3b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableA
GetVersion
HeapCreate
GetModuleHandleA
CloseHandle
GetStartupInfoA
Sleep
HeapDestroy
ExitProcess
FindClose
WriteConsoleA
GetCommandLineW
SuspendThread
SetLastError
EnumResourceTypesW
DeleteFileA
CloseHandle
CreateSemaphoreW
OpenEventA
lstrlenW
user32
GetSysColor
CallWindowProcW
GetWindowLongA
FindWindowA
GetClassInfoA
DispatchMessageA
GetClipCursor
DispatchMessageA
GetKeyState
PeekMessageA
IsZoomed
DrawTextW
CreateIcon
docprop
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 806KB - Virtual size: 805KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ