Static task
static1
Behavioral task
behavioral1
Sample
b00a56bf730822961cea9ffb65659f9ecc4decc176e17e0c717f9b8303ef53e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b00a56bf730822961cea9ffb65659f9ecc4decc176e17e0c717f9b8303ef53e0.exe
Resource
win10v2004-20220901-en
General
-
Target
b00a56bf730822961cea9ffb65659f9ecc4decc176e17e0c717f9b8303ef53e0
-
Size
192KB
-
MD5
55bf20667237b9d7f306c5759022ce17
-
SHA1
0a5878b1de53f138031cbc2698e3e4c9a9b24d42
-
SHA256
b00a56bf730822961cea9ffb65659f9ecc4decc176e17e0c717f9b8303ef53e0
-
SHA512
b4e26f40e24240334a1a2fd59bf72f4b2c685f60d4c0c69fb547e068a379b8094e169ed11ca5f5cfab2c20fc1088839b7b18d03bfa8dc24e48c09f5d53aff362
-
SSDEEP
3072:zWuhHAWs/2SLZC1PX9sUE0ZyZPqR0m+iNIy9ewjWSeetbvYkelsoX:CGsRLZC1PX9bEfZyqmbFJQkeKoX
Malware Config
Signatures
Files
-
b00a56bf730822961cea9ffb65659f9ecc4decc176e17e0c717f9b8303ef53e0.exe windows x86
b0f5c5f2d903d3c8790e6f75e252c367
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
memset
wcscat
vsprintf
memcpy
DbgPrint
RtlUnwind
kernel32
CheckRemoteDebuggerPresent
WaitForSingleObject
SetProcessShutdownParameters
GetModuleHandleA
ExitProcess
HeapAlloc
GetProcessHeap
Sleep
TerminateProcess
GetProcAddress
user32
EndPaint
DispatchMessageW
DefWindowProcW
UpdateWindow
DestroyWindow
CreateWindowExW
ShowWindow
LoadStringW
RegisterClassExW
TranslateMessage
BeginPaint
PostQuitMessage
GetMessageW
MessageBoxW
ole32
CoInitialize
comctl32
ord17
powrprof
GetActivePwrScheme
wintrust
WinVerifyTrust
Sections
.text Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ