Static task
static1
Behavioral task
behavioral1
Sample
bb05884660051d0a98a3a3a3499bbdf6b30fd95a25a739166349684583e62620.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb05884660051d0a98a3a3a3499bbdf6b30fd95a25a739166349684583e62620.exe
Resource
win10v2004-20220901-en
General
-
Target
bb05884660051d0a98a3a3a3499bbdf6b30fd95a25a739166349684583e62620
-
Size
10KB
-
MD5
696745f0be2bf482f14751f9114e5920
-
SHA1
06837e196dd024c855a00c447b938fad6a751e39
-
SHA256
bb05884660051d0a98a3a3a3499bbdf6b30fd95a25a739166349684583e62620
-
SHA512
225c360d74aa06b1b1a81b5191589c18531f6fb303fab4c4b16a63da988f2c40d455604c276925b07ed9be99d2ae175b73bcda5cf864f5de41dc116c891081bf
-
SSDEEP
192:v/txpyuTbuWMkrdE7dOS2WvB6Wb5NoDo:vpyep99ZWZ6W9NoD
Malware Config
Signatures
Files
-
bb05884660051d0a98a3a3a3499bbdf6b30fd95a25a739166349684583e62620.exe windows x86
a25d4b9aa9c7efd2d8f84aee975e4c57
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
??2@YAPAXI@Z
??3@YAXPAX@Z
kernel32
CreateProcessW
GetModuleHandleA
GetCommandLineW
GetSystemDirectoryW
lstrcatW
CreateFileW
CloseHandle
FormatMessageW
lstrlenW
lstrcpyW
LocalFree
GetLastError
lstrcpynW
GetModuleHandleW
user32
GetWindowRect
ScreenToClient
DialogBoxParamW
SetWindowLongW
DestroyWindow
LoadStringW
wsprintfW
GetDlgItem
EndDialog
SetWindowPos
ShowWindow
EnableWindow
SetWindowTextW
SendDlgItemMessageW
LoadIconW
WaitForInputIdle
GetWindowLongW
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE