Static task
static1
Behavioral task
behavioral1
Sample
4d77d2e7c5f90f7fc76178e4f01da544c1086edc671d0127e23aae4834f0d367.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4d77d2e7c5f90f7fc76178e4f01da544c1086edc671d0127e23aae4834f0d367.exe
Resource
win10v2004-20220812-en
General
-
Target
4d77d2e7c5f90f7fc76178e4f01da544c1086edc671d0127e23aae4834f0d367
-
Size
76KB
-
MD5
6891e7268989acc1da96529e8b381ff0
-
SHA1
a1bbbb2afcfd0b867fbd664b047725225a9fe31f
-
SHA256
4d77d2e7c5f90f7fc76178e4f01da544c1086edc671d0127e23aae4834f0d367
-
SHA512
cd5612c366ff4dfea9a62f444c3b1758a37f9239e8bed37200e64049a5e8058a1f9cbd022d7487c9c5b77045830d96a8391d2a27544d46e920f4f87523ed56ca
-
SSDEEP
1536:xORt+PHio/oT6YLTCG41rs2GIxAEmzR1SdPF:xeU5AQ1ACCzidPF
Malware Config
Signatures
Files
-
4d77d2e7c5f90f7fc76178e4f01da544c1086edc671d0127e23aae4834f0d367.exe windows x86
1160daec76708e79f5d0cbd5eedfa74d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
SearchPathA
FreeConsole
GetLastError
VirtualProtect
GetComputerNameA
GetCommandLineA
CreateMutexA
OpenMutexA
SetEvent
GetBinaryTypeA
FindClose
CloseHandle
GetModuleHandleA
CreateSemaphoreA
GetTickCount
ReleaseMutex
SetLastError
Sleep
TlsGetValue
shell32
SHGetMalloc
DragFinish
SheGetDirA
SHGetSettings
ShellMessageBoxA
DragQueryFileA
DragQueryPoint
SHGetNewLinkInfo
SHFree
SHGetDiskFreeSpaceA
SheChangeDirA
DragAcceptFiles
ShellAboutA
SHAlloc
loghours
DirSyncScheduleDialogEx
LogonScheduleDialog
DirSyncScheduleDialog
DialinHoursDialog
DialinHoursDialogEx
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ