Static task
static1
Behavioral task
behavioral1
Sample
852497181ebd3c61655b8530e4796051de4fce03e2627ca8a4c44089da69e328.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
852497181ebd3c61655b8530e4796051de4fce03e2627ca8a4c44089da69e328.exe
Resource
win10v2004-20220812-en
General
-
Target
852497181ebd3c61655b8530e4796051de4fce03e2627ca8a4c44089da69e328
-
Size
799KB
-
MD5
4c89c20d35609f6b81996f5651d0f350
-
SHA1
251ed9a02a01be57198735c168cb5c55b3259cc7
-
SHA256
852497181ebd3c61655b8530e4796051de4fce03e2627ca8a4c44089da69e328
-
SHA512
46c5571b27cdf0a76cc4d0b360fce14bce26048ebce297d4a5d9e16ea9816b92c00d8336ebdf67b987a6c9f2298040f092a94cbe7029c683160d9c350de957cd
-
SSDEEP
24576:klvuKyrecVfbMtjwkkh8dgbvflyBGch7l4:kGrrMtjwk8PrcBvZa
Malware Config
Signatures
Files
-
852497181ebd3c61655b8530e4796051de4fce03e2627ca8a4c44089da69e328.exe windows x86
5ee67a62ca1dcb405a3f5561451d3912
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ResumeThread
CreateDirectoryA
SetLocalTime
ReadConsoleW
ResumeThread
GlobalSize
VirtualProtect
GetCommandLineA
GetFileAttributesA
WriteFile
SuspendThread
DeleteFileA
HeapSize
GetProcessHeap
GetPriorityClass
GetStdHandle
IsBadReadPtr
CreatePipe
GetLocaleInfoA
GetModuleHandleA
GetDriveTypeA
user32
LoadCursorA
GetMessageA
GetWindowLongA
DrawIcon
SetCursor
GetWindowTextW
DestroyIcon
wsprintfA
DestroyMenu
DispatchMessageA
PeekMessageA
SetRect
GetWindowLongA
els
DllUnregisterServer
DllRegisterServer
DllUnregisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE