Static task
static1
Behavioral task
behavioral1
Sample
886afc2b4998ed0c656c8ba1d3e80a1c005709553f14895c08905933bab94ec8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
886afc2b4998ed0c656c8ba1d3e80a1c005709553f14895c08905933bab94ec8.exe
Resource
win10v2004-20220812-en
General
-
Target
886afc2b4998ed0c656c8ba1d3e80a1c005709553f14895c08905933bab94ec8
-
Size
50KB
-
MD5
910bbf7ec214156f21c0025d6f7dc646
-
SHA1
21216b298735345c1e2d796850187d6188593b70
-
SHA256
886afc2b4998ed0c656c8ba1d3e80a1c005709553f14895c08905933bab94ec8
-
SHA512
ca8743883ba2f6a6604261c084925002a21674bdbf394d63ba84cc42f2b3e083ecd199993e67083c9ca20e9eb1dd3d27f36109d2b2ac499393477d1a1593ecb2
-
SSDEEP
768:SJcC+DQGdPsiJ9K/PbyvC5IhFFqLrWDKszTqbYDrLExE6TLCgcJdP1+m4Ef4:QiLGTiCwWmPlfgC6LAZv4
Malware Config
Signatures
Files
-
886afc2b4998ed0c656c8ba1d3e80a1c005709553f14895c08905933bab94ec8.exe windows x86
f8f4b5d31b19d547b2f80c89f19556f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetCurrentThreadId
CreateMutexA
WaitForSingleObject
GetProcAddress
LoadLibraryA
SuspendThread
ReadFile
GetCurrentThread
GetCurrentProcess
VirtualProtect
CloseHandle
LocalFree
SetFilePointer
LocalAlloc
ReleaseMutex
GetFileSize
CreateFileA
GetModuleFileNameA
DeleteFileA
VirtualAllocEx
ExitProcess
GetModuleHandleA
Sleep
WriteFile
VirtualFree
VirtualAlloc
GetSystemDirectoryA
user32
GetForegroundWindow
FindWindowA
GetActiveWindow
PostMessageA
ShowWindow
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ