Static task
static1
Behavioral task
behavioral1
Sample
f49ae4aded947824e3aa9a418bcf3560550e072bc0d03d453cedf48d6515c296.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f49ae4aded947824e3aa9a418bcf3560550e072bc0d03d453cedf48d6515c296.exe
Resource
win10v2004-20220812-en
General
-
Target
f49ae4aded947824e3aa9a418bcf3560550e072bc0d03d453cedf48d6515c296
-
Size
767KB
-
MD5
0acfbd2c480217c7081d2e519c0b7d20
-
SHA1
99c1fa79cac1bae704ad287f5ec3a1138be1ceaf
-
SHA256
f49ae4aded947824e3aa9a418bcf3560550e072bc0d03d453cedf48d6515c296
-
SHA512
7516bf520266ef5229e0514206f3b4456fbf11072cf8b13c07c86a5028269b17918160749c77908cf4fb61a3c97d3214f8f5131c115544de32ea2fd6f97defe9
-
SSDEEP
12288:RSiM7+wsWHleMRdccXLt/Rsn/cYk2Js8Kf1EtVwSglu7BaBG3p6q3IUPp0jNW:RSieRnh6/5tKf+fel2BMDy1C
Malware Config
Signatures
Files
-
f49ae4aded947824e3aa9a418bcf3560550e072bc0d03d453cedf48d6515c296.exe windows x86
3cc04f6e35496e02bb49b461a99ae655
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
HeapSize
GetCommandLineW
CloseHandle
GetStdHandle
OpenEventW
DeleteFileA
CloseHandle
CreatePipe
VirtualProtectEx
GetVersion
LoadLibraryA
CreateFileA
lstrlenA
CreateFileMappingW
RemoveDirectoryW
WriteConsoleW
RemoveDirectoryW
HeapDestroy
Sleep
GetFileSize
CreateDirectoryW
ReleaseSemaphore
ReleaseMutex
CreateMutexA
user32
MessageBoxA
DrawTextW
PeekMessageA
GetClassInfoA
CreateIcon
GetSysColor
IsZoomed
DestroyMenu
GetWindowLongA
DispatchMessageA
FindWindowA
IsWindow
DestroyMenu
eventcls
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 760KB - Virtual size: 760KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE