Static task
static1
Behavioral task
behavioral1
Sample
2849dab99b9d9aac71745604f543131ed119b71a487b1b0247d118c9b632cdda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2849dab99b9d9aac71745604f543131ed119b71a487b1b0247d118c9b632cdda.exe
Resource
win10v2004-20220901-en
General
-
Target
2849dab99b9d9aac71745604f543131ed119b71a487b1b0247d118c9b632cdda
-
Size
80KB
-
MD5
6c0f584a92fff74c8a6f30bb32d24f20
-
SHA1
72616a0b22b3788206b2f37f013e253109ad0358
-
SHA256
2849dab99b9d9aac71745604f543131ed119b71a487b1b0247d118c9b632cdda
-
SHA512
451b9781369a0000a444c539d874afdbfe91f44fcfd1bc1764b36dd51ef591cee296541ab4f20ff4c1aacceb446fd1d839611d920af27c79ca767ef46e28658d
-
SSDEEP
768:5petD9nrhdpKNI7CeurbdRCd9J3f/YJERewHIGrMbcfqH4Dkg/qW1:ParhfvW1dRCd9Nf/9frMbwqYIg/f
Malware Config
Signatures
Files
-
2849dab99b9d9aac71745604f543131ed119b71a487b1b0247d118c9b632cdda.exe windows x86
787a77919083e54185aa58eb927a18d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
IsBadReadPtr
GetModuleHandleA
GetCommandLineA
WriteFile
GetDriveTypeA
CreateDirectoryA
HeapSize
ResumeThread
GetPriorityClass
VirtualProtect
GetFileAttributesA
GetStdHandle
SuspendThread
SetLocalTime
GetLocaleInfoA
CreatePipe
ReadConsoleW
ResumeThread
DeleteFileA
GlobalSize
user32
PeekMessageA
SetCursor
GetWindowLongA
LoadCursorA
GetMessageA
DispatchMessageA
DestroyIcon
DrawIcon
GetWindowTextW
wsprintfA
GetWindowLongA
DestroyMenu
SetRect
els
DllRegisterServer
DllUnregisterServer
DllUnregisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE