Static task
static1
Behavioral task
behavioral1
Sample
00febe1f683ceabe6b4b6321e44907fc22ba96f08e598fffc754a389c822f311.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00febe1f683ceabe6b4b6321e44907fc22ba96f08e598fffc754a389c822f311.exe
Resource
win10v2004-20220812-en
General
-
Target
00febe1f683ceabe6b4b6321e44907fc22ba96f08e598fffc754a389c822f311
-
Size
303KB
-
MD5
a0b2092f2d3c211be958f981dd7d4bc0
-
SHA1
308d6a67efdb0bf13d11d748c4463c05ab512561
-
SHA256
00febe1f683ceabe6b4b6321e44907fc22ba96f08e598fffc754a389c822f311
-
SHA512
0fc40034f86f9c3705a766794b282712fa3dfb928baa7bf5d433268c93690f9dc91843ead8a398a5e272f6368336e9aedd7704df2ea3410a993adc046cde6d46
-
SSDEEP
6144:zMzbsn1GD2RBqNKn404W+ND3jwHUfNQ7X1VWS0I0dLnb:QkRBqY+WmLA4Q7X18W0N
Malware Config
Signatures
Files
-
00febe1f683ceabe6b4b6321e44907fc22ba96f08e598fffc754a389c822f311.exe windows x86
63f8be146baef7925e4d8bf333637fdf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WriteFile
GetStdHandle
GetFileAttributesW
GetPriorityClass
GetLocaleInfoA
ResumeThread
DeleteFileA
GetDriveTypeA
SetEndOfFile
IsBadReadPtr
SuspendThread
GetProcessHeap
ResumeThread
HeapSize
GlobalSize
GetCommandLineA
CreateDirectoryA
GetModuleHandleA
ReadConsoleA
CreatePipe
VirtualProtect
user32
GetWindowLongA
LoadCursorA
DispatchMessageA
DestroyIcon
DrawIcon
SetCursor
SetRect
GetWindowTextW
GetWindowLongA
wsprintfA
GetScrollInfo
DestroyMenu
PeekMessageA
els
DllRegisterServer
DllUnregisterServer
DllCanUnloadNow
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE