Static task
static1
Behavioral task
behavioral1
Sample
4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0.exe
Resource
win10v2004-20220812-en
General
-
Target
4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0
-
Size
27KB
-
MD5
969cf56ba5d9f9f7658a28f3d76af380
-
SHA1
7a2932d9d25d98b82b508de6d571a591be30c1f5
-
SHA256
4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0
-
SHA512
6f6865a4be78964676d2632b0b822381aa9c2bf7a3c3ef58e5343df86570b2637c798a8c57ad60daa10ba025d9d96815a2d5cb06890900df3fccc2db1bc611cc
-
SSDEEP
384:lijuGXOsa32vAmJDmX93THDezUt099d9SoHeZrF1EoU6t518gpmvDUlLg:lijuGboSDy9Lt0L8ZrFq81bp5lL
Malware Config
Signatures
Files
-
4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0.exe windows x86
922e0ec49c6ca97da8c91db30f0077a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitThread
GetDriveTypeW
CreatePipe
GetCommandLineA
AddAtomA
FindClose
DeleteAtom
HeapCreate
CloseHandle
IsBadWritePtr
ClearCommBreak
GetModuleHandleA
RemoveDirectoryA
RemoveDirectoryA
WaitForMultipleObjects
GetProcessHeap
GetFileType
FindAtomA
WriteFile
HeapFree
GetModuleFileNameA
CreateSemaphoreW
SetVolumeLabelA
SetEndOfFile
CreateDirectoryA
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE