Static task
static1
Behavioral task
behavioral1
Sample
b396d5f5fb15fbcdfce6772ffab3da70511ffee62fac8e8cbebe16c9e0f453e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b396d5f5fb15fbcdfce6772ffab3da70511ffee62fac8e8cbebe16c9e0f453e3.exe
Resource
win10v2004-20220812-en
General
-
Target
b396d5f5fb15fbcdfce6772ffab3da70511ffee62fac8e8cbebe16c9e0f453e3
-
Size
80KB
-
MD5
7c64d12139dbbc4ca1667c572c536930
-
SHA1
7416c214f7cccff9b727772b88d4126563d7aa7a
-
SHA256
b396d5f5fb15fbcdfce6772ffab3da70511ffee62fac8e8cbebe16c9e0f453e3
-
SHA512
58d6c6cbdcb710b719e1d9e95dabb66a18d57ed10eea2e26f1831e1f64b3e8f10a81ee651667e1da324463f3e013c248655ef80485a30cea25e2b3e5c91bfb68
-
SSDEEP
1536:zHRIwziEzZJ7Z9jSVO/FkK8jzfGW+A/esrwsaB:xZJ7ZlqiR2+U/eov
Malware Config
Signatures
Files
-
b396d5f5fb15fbcdfce6772ffab3da70511ffee62fac8e8cbebe16c9e0f453e3.exe windows x86
6c6f4008a7093d4fea2ec2c572cbe327
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ReadConsoleW
CreatePipe
GetModuleHandleA
HeapSize
GetFileAttributesA
SuspendThread
DeleteFileA
GetCommandLineA
VirtualProtect
GetPriorityClass
SetLocalTime
CreateDirectoryA
GetStdHandle
WriteFile
GetProcessHeap
GlobalSize
IsBadReadPtr
GetLocaleInfoA
ResumeThread
GetDriveTypeA
ResumeThread
user32
PeekMessageA
DispatchMessageA
GetMessageA
GetWindowLongA
GetWindowTextW
DrawIcon
SetRect
SetFocus
wsprintfA
DestroyMenu
GetWindowLongA
SetCursor
LoadCursorA
els
DllRegisterServer
DllGetClassObject
DllRegisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE