Static task
static1
Behavioral task
behavioral1
Sample
a908c6cce922fe3b028e32ac60937dc5dd4fa2466fe0f956a996938974e1720c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a908c6cce922fe3b028e32ac60937dc5dd4fa2466fe0f956a996938974e1720c.exe
Resource
win10v2004-20220812-en
General
-
Target
a908c6cce922fe3b028e32ac60937dc5dd4fa2466fe0f956a996938974e1720c
-
Size
303KB
-
MD5
785c2c9a6a2062ef23e8713941df2da0
-
SHA1
90802b1e20aa16e00c935ab961c267adbc08a549
-
SHA256
a908c6cce922fe3b028e32ac60937dc5dd4fa2466fe0f956a996938974e1720c
-
SHA512
1cb29d423c97ffcb1322072602f10824ccb2fdccfb7032a9102bc6eb6f780c93dbad16aaba0282bba4f2a017629e186b2ff497ac1c9066c28d8417b9431a4c32
-
SSDEEP
6144:0QMzbdifjQoXsFE2ydAPTUgLQgIMgjUgca8mNmZWSBQe:03FJUBSLUtBMgPcaFmAF
Malware Config
Signatures
Files
-
a908c6cce922fe3b028e32ac60937dc5dd4fa2466fe0f956a996938974e1720c.exe windows x86
0ed08ae3bbbbb4713ebcca525ba88ca7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetCommandLineA
VirtualProtect
GetFileAttributesW
HeapSize
CreateDirectoryA
GetProcessHeap
DeleteFileA
ReadConsoleA
GetPriorityClass
SetEndOfFile
GetLocaleInfoA
WriteFile
GetStdHandle
SuspendThread
ResumeThread
IsBadReadPtr
lstrlenA
CreatePipe
GlobalSize
GetModuleHandleA
GetDriveTypeA
user32
GetWindowLongA
SetRect
DestroyMenu
GetWindowTextW
GetScrollInfo
GetWindowLongA
SetCursor
DispatchMessageA
LoadCursorA
DestroyIcon
PeekMessageA
DrawIcon
wsprintfA
els
DllRegisterServer
DllCanUnloadNow
DllUnregisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE