Static task
static1
Behavioral task
behavioral1
Sample
60421473cb0167cbed7f589e81a2a1ea288ac802d19745622ab9aa39b2c80de3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
60421473cb0167cbed7f589e81a2a1ea288ac802d19745622ab9aa39b2c80de3.exe
Resource
win10v2004-20220812-en
General
-
Target
60421473cb0167cbed7f589e81a2a1ea288ac802d19745622ab9aa39b2c80de3
-
Size
80KB
-
MD5
0b54d14a58a26d58ea00765c5b71edb1
-
SHA1
a363677442d7eb6a5a228c4bdbd270adf03f9d84
-
SHA256
60421473cb0167cbed7f589e81a2a1ea288ac802d19745622ab9aa39b2c80de3
-
SHA512
76039b7fd7368799fdab42a2fa7645b9dc16c3780de6e449481a9b0aeb279620d79c9c7699baed2d3c1b6cefb5682f3741a8ede3c6a900d8b43b283023c586aa
-
SSDEEP
1536:xcldpq5/st7WCxM7j+eSP3fepG4fFkWGq6cjTA:0u5/stWCxM7SeSu84dkWGqzjTA
Malware Config
Signatures
Files
-
60421473cb0167cbed7f589e81a2a1ea288ac802d19745622ab9aa39b2c80de3.exe windows x86
fdad5176929a777f8cd9f48467f3bbbc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenSemaphoreA
HeapValidate
HeapCompact
CreateTapePartition
GetTimeZoneInformation
GetDevicePowerState
EnumCalendarInfoExA
HeapFree
GetProcessHeap
HeapAlloc
ExitThread
ExitProcess
gdi32
SetPixel
SetROP2
GetLayout
SetLayout
GetDeviceCaps
DeleteObject
LineTo
CreatePen
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetDIBitsToDevice
DeleteDC
GetStockObject
MoveToEx
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ