Static task
static1
Behavioral task
behavioral1
Sample
83d205fa9f1fab679ab59811f6a0581047d875f980eaad47ad6d36c1253bcc62.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
83d205fa9f1fab679ab59811f6a0581047d875f980eaad47ad6d36c1253bcc62.exe
Resource
win10v2004-20220812-en
General
-
Target
83d205fa9f1fab679ab59811f6a0581047d875f980eaad47ad6d36c1253bcc62
-
Size
416KB
-
MD5
a108585f59f5df8d4bd743514b3bb640
-
SHA1
c7c9937f092c774f22944a095209f349f22e3859
-
SHA256
83d205fa9f1fab679ab59811f6a0581047d875f980eaad47ad6d36c1253bcc62
-
SHA512
11e6a9c81214c784d46609fc7a81e0d2fff3a686f44ab329b6480039ce521944195c7ceb5ca11fd9d7b37f6cd1affd7653a7dbd558eeb37862314fe4756d90c1
-
SSDEEP
12288:BEg9tTe+tQmqelgczlFbbi68nnmh0d4c:BEgftXqelg6Lbqmad4c
Malware Config
Signatures
Files
-
83d205fa9f1fab679ab59811f6a0581047d875f980eaad47ad6d36c1253bcc62.exe windows x86
beda1979e9dbec22d6e48b57ce925ad6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ResumeThread
SuspendThread
GetStdHandle
GetCommandLineA
ResumeThread
ReadConsoleW
CreateDirectoryA
VirtualProtect
GetFileAttributesA
HeapSize
GetProcessHeap
DeleteFileA
GlobalSize
GetDriveTypeA
GetLocaleInfoA
WriteFile
SetLocalTime
GetPriorityClass
GetModuleHandleA
CreatePipe
IsBadReadPtr
user32
DispatchMessageA
SetCursor
PeekMessageA
DestroyIcon
DrawIcon
wsprintfA
GetWindowLongA
GetWindowTextW
SetRect
GetMessageA
LoadCursorA
GetWindowLongA
DestroyMenu
els
DllGetClassObject
DllUnregisterServer
DllRegisterServer
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 410KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE