Static task
static1
Behavioral task
behavioral1
Sample
17ba51a68da4d2b9f94b6c737bc9f5f71413fd7fdcb3ae7fa4296eaed6cff3f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17ba51a68da4d2b9f94b6c737bc9f5f71413fd7fdcb3ae7fa4296eaed6cff3f5.exe
Resource
win10v2004-20220812-en
General
-
Target
17ba51a68da4d2b9f94b6c737bc9f5f71413fd7fdcb3ae7fa4296eaed6cff3f5
-
Size
304KB
-
MD5
917d5f0b434982654ba78f59e7b1b1b0
-
SHA1
5fcb6e10029aca3c7271c31739a62b0ac7951d88
-
SHA256
17ba51a68da4d2b9f94b6c737bc9f5f71413fd7fdcb3ae7fa4296eaed6cff3f5
-
SHA512
995c8955ebeefea1d5e881ed6e57003867c9b30af30e19c9202a3f12da3560094fea2cc2cea0cfdcc269c772d5c1b8fea2d7f830b4b0ab4f53e41453434adde3
-
SSDEEP
6144:tMzbyGGvd3Q8x5nzd7aGmCUEGu4o5+Q7MPvUCcfs:+5GvBQS7RmEVF1MnXcs
Malware Config
Signatures
Files
-
17ba51a68da4d2b9f94b6c737bc9f5f71413fd7fdcb3ae7fa4296eaed6cff3f5.exe windows x86
ee2d12ca8287740a2ce06d563500b2e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ResumeThread
GetPriorityClass
GetDriveTypeA
GetModuleHandleA
CreateDirectoryA
GetProcessHeap
GetFileAttributesA
WriteFile
GetStdHandle
SuspendThread
DeleteFileA
IsBadReadPtr
VirtualProtect
GetLocaleInfoA
ReadConsoleW
SetLocalTime
GlobalSize
HeapSize
GetCommandLineA
ResumeThread
CreatePipe
user32
DispatchMessageA
GetWindowTextW
GetMessageA
GetCapture
SetFocus
PeekMessageA
LoadCursorA
DrawIcon
DestroyMenu
wsprintfA
SetCursor
GetWindowLongW
GetCaretPos
els
DllRegisterServer
DllRegisterServer
DllGetClassObject
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE