Static task
static1
Behavioral task
behavioral1
Sample
f159dac7a5d9b31460c51f5b64fbf8479e668332fa33bf432f637370b2c6c703.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f159dac7a5d9b31460c51f5b64fbf8479e668332fa33bf432f637370b2c6c703.exe
Resource
win10v2004-20220901-en
General
-
Target
f159dac7a5d9b31460c51f5b64fbf8479e668332fa33bf432f637370b2c6c703
-
Size
85KB
-
MD5
84dbc9bc21c28b8c2cf84e62c753b1a0
-
SHA1
32b8c40a142b2a5a5e98ca3a630adaeefd2a0f4c
-
SHA256
f159dac7a5d9b31460c51f5b64fbf8479e668332fa33bf432f637370b2c6c703
-
SHA512
0f5cbb7694417685661fa29d6336687285a04af40d0997070ca34744683c8920bde34b342cab228f2953a8b667a0c66ea832b6a0e63f2bdc82d364d073c809dc
-
SSDEEP
1536:ycwDwKrNoVckz9Cp1rnCFRfzQtckqGj30qSVv:swKrN60pxn7jqQnSV
Malware Config
Signatures
Files
-
f159dac7a5d9b31460c51f5b64fbf8479e668332fa33bf432f637370b2c6c703.exe windows x86
d2556be72524d357ae41f98c84748bf1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
IsBadReadPtr
WriteFile
SuspendThread
GetStdHandle
ResumeThread
GetDriveTypeA
ReadConsoleW
VirtualProtect
GetModuleHandleA
HeapSize
GetFileAttributesW
ResumeThread
GetPriorityClass
SetEndOfFile
GetLocaleInfoA
DeleteFileA
GetCommandLineA
CreatePipe
GlobalSize
GetProcessHeap
CreateDirectoryA
user32
SetCursor
LoadCursorA
GetWindowTextW
wsprintfA
DispatchMessageA
PeekMessageA
GetWindowLongA
SetRect
GetWindowLongA
GetScrollInfo
DestroyMenu
DrawIcon
DestroyIcon
els
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE