Static task
static1
Behavioral task
behavioral1
Sample
904e484e210770389032e9a8f33f1ec76bd500bdafec87f746ad45812ab72c19.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
904e484e210770389032e9a8f33f1ec76bd500bdafec87f746ad45812ab72c19.exe
Resource
win10v2004-20220812-en
General
-
Target
904e484e210770389032e9a8f33f1ec76bd500bdafec87f746ad45812ab72c19
-
Size
67KB
-
MD5
04f2271e15ec9c5343e46f39762ddbd0
-
SHA1
4ec5ab25774e9f4626459ee543a6da6250585d53
-
SHA256
904e484e210770389032e9a8f33f1ec76bd500bdafec87f746ad45812ab72c19
-
SHA512
53912c7ae4acfc546971188fce5cbd335cdb728ce5ca78b1ddb502cf69e582d2d780db455ba2ff89a0a3ac29b0bd8fd94015f98482bd22c7f20f4796ff9c4d05
-
SSDEEP
1536:yTjn3aq+k62AlfwOWaKDFwNMWLWoO4cyD3:ySq+WApwrpwbKoRxz
Malware Config
Signatures
Files
-
904e484e210770389032e9a8f33f1ec76bd500bdafec87f746ad45812ab72c19.exe windows x86
896d017dd5183b400d9a00aa462409d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
CreateMailslotA
CreateFileMappingW
VirtualAlloc
GetShortPathNameW
GetStringTypeW
SetCurrentDirectoryA
DeleteFileA
SetVolumeLabelA
DeleteFileA
GetModuleHandleW
CreateSemaphoreW
SetEnvironmentVariableA
InterlockedExchange
DeviceIoControl
CreatePipe
DeleteFileA
GetProcessHeap
WriteConsoleW
GetConsoleAliasA
GetModuleHandleA
FatalExit
GetACP
mshtml
ShowModalDialog
DllEnumClassObjects
ShowHTMLDialog
ShowModelessHTMLDialog
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrs Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.afdr Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ