Static task
static1
Behavioral task
behavioral1
Sample
f0b1c3349feaea877d6274fd36300a739948f0bf21de5110a42b007de7241ebb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0b1c3349feaea877d6274fd36300a739948f0bf21de5110a42b007de7241ebb.exe
Resource
win10v2004-20220812-en
General
-
Target
f0b1c3349feaea877d6274fd36300a739948f0bf21de5110a42b007de7241ebb
-
Size
54KB
-
MD5
68b89ca4ae1eab6c847c273efe4782a0
-
SHA1
983176b5cc8730254e94160948d261188eedba17
-
SHA256
f0b1c3349feaea877d6274fd36300a739948f0bf21de5110a42b007de7241ebb
-
SHA512
507a8878e736d68216b31ec72431f238c9955473e2c259e5d09bbc45821fee9992209ede673fdaff3cf9114271ef863e39263a05293f77534cd8ce510f2713b0
-
SSDEEP
1536:cxAU8VodMzcqsXotJrSkn9UidFIgizH9G/Mzr:cxA7VoMKotJukn9Ui0gizHE/M
Malware Config
Signatures
Files
-
f0b1c3349feaea877d6274fd36300a739948f0bf21de5110a42b007de7241ebb.exe windows x86
fce7809a30096dee5d325be7178490ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetThreadContext
GetTickCount
LoadResource
LockResource
ReadProcessMemory
ResumeThread
SetThreadContext
SizeofResource
Sleep
VirtualAlloc
VirtualAllocEx
VirtualFree
WriteProcessMemory
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE