Static task
static1
Behavioral task
behavioral1
Sample
5fe1950934d14d9bdbfc1888ba0274281b336fb975e0f29f47bf1b25d1d7bc73.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fe1950934d14d9bdbfc1888ba0274281b336fb975e0f29f47bf1b25d1d7bc73.exe
Resource
win10v2004-20220812-en
General
-
Target
5fe1950934d14d9bdbfc1888ba0274281b336fb975e0f29f47bf1b25d1d7bc73
-
Size
303KB
-
MD5
a166c85ad6516eb0db45e9e64fa17d40
-
SHA1
1764eb9abb49c1b8d63d359d591a74d601ac2110
-
SHA256
5fe1950934d14d9bdbfc1888ba0274281b336fb975e0f29f47bf1b25d1d7bc73
-
SHA512
e5f6a33f61ae384358720ec4d5b9f7af0b4c729a92d372e884e2d48e5230efeb53daa28345af76d5e7da0d0139b1769c6b5c6e90c478c3a779d87c3c9551dc1e
-
SSDEEP
6144:mMzbOPD6Rim1GIrM+U7pXp90dLMWValGMvhCre9bq:5GPDE11dQQMHlB9bq
Malware Config
Signatures
Files
-
5fe1950934d14d9bdbfc1888ba0274281b336fb975e0f29f47bf1b25d1d7bc73.exe windows x86
1fc095748d399ef2645b4637cd1c5b8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GlobalSize
HeapSize
GetProcessHeap
IsBadReadPtr
ResumeThread
GetStdHandle
ReadConsoleW
GetFileAttributesA
CreatePipe
SuspendThread
ResumeThread
GetPriorityClass
DeleteFileA
GetCommandLineA
VirtualProtect
GetModuleHandleA
CreateDirectoryA
GetLocaleInfoA
WriteFile
GetDriveTypeA
SetLocalTime
user32
SetFocus
wsprintfA
DispatchMessageA
DestroyMenu
LoadCursorA
SetRect
GetMessageA
PeekMessageA
GetWindowTextW
GetWindowLongA
SetCursor
DrawIcon
GetWindowLongA
els
DllRegisterServer
DllGetClassObject
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE