Static task
static1
Behavioral task
behavioral1
Sample
b0e2dc32507d585e90c45d0a09e78fefde765377c11082b59090b29b06f647fc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b0e2dc32507d585e90c45d0a09e78fefde765377c11082b59090b29b06f647fc.exe
Resource
win10v2004-20220812-en
General
-
Target
b0e2dc32507d585e90c45d0a09e78fefde765377c11082b59090b29b06f647fc
-
Size
32KB
-
MD5
90cab58aa405c4bb9f86921d5c44935f
-
SHA1
fe449dfb4067a3d41961afd9c5fbc9285c516385
-
SHA256
b0e2dc32507d585e90c45d0a09e78fefde765377c11082b59090b29b06f647fc
-
SHA512
6bce8e6feb76aa93feac3471007a304286a7288f7a5e4f4633055432ce1f01fd25d14e9c438afdbeb875ad0a65945e47e5369c935a2ea4c5ff5ed46212e9fe18
-
SSDEEP
192:MOHo4GreaoL8c1QQW2Z7P1oynE+9pJKEDFhgm/1lHmTAZbebAtMGV18gg:PHo4+epQ87D1i+9bfvgm/1lHmzTGf8
Malware Config
Signatures
Files
-
b0e2dc32507d585e90c45d0a09e78fefde765377c11082b59090b29b06f647fc.exe windows x86
2de711cc410e1c08a8508e229c0d8f60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
msvcrt
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_acmdln
__p__fmode
_access
_except_handler3
_controlfp
exit
_XcptFilter
_exit
strchr
strlen
strcpy
strcat
fopen
fprintf
fclose
strrchr
memset
sprintf
__p__commode
__set_app_type
kernel32
GetModuleHandleA
GetStartupInfoA
CreateFileA
CloseHandle
GetFileTime
SetFileTime
GetWindowsDirectoryA
DeleteFileA
FindFirstFileA
CopyFileA
FindNextFileA
FindClose
GetModuleFileNameA
GetVersionExA
WinExec
Sleep
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE