Static task
static1
Behavioral task
behavioral1
Sample
4bd3955ee23608a9c790761cfbd23ea343cefa9355116fb1c3efc09cd5f236d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4bd3955ee23608a9c790761cfbd23ea343cefa9355116fb1c3efc09cd5f236d4.exe
Resource
win10v2004-20220812-en
General
-
Target
4bd3955ee23608a9c790761cfbd23ea343cefa9355116fb1c3efc09cd5f236d4
-
Size
750KB
-
MD5
0b16419c61f834696b146600ba1b79e1
-
SHA1
1e1766b00af3bad7e99932e09835e3fbbf54f213
-
SHA256
4bd3955ee23608a9c790761cfbd23ea343cefa9355116fb1c3efc09cd5f236d4
-
SHA512
6d75a002905555cf2542298ee1418bea4c62d067737d7479c7b971e266323fc2c5ed5154904d8a65e21b68322e3cb9caeb3cbdd96e2c4d3b38ced062b8f4ded5
-
SSDEEP
12288:BMFihSn/UaZtuouWZBHoAn7veIcbs5Nmvgm7QLPSF9Ajf8F3TH:qF4Zi0ouW3o87vfc6NcsuF9jH
Malware Config
Signatures
Files
-
4bd3955ee23608a9c790761cfbd23ea343cefa9355116fb1c3efc09cd5f236d4.exe windows x86
06d03d4a355df77b0b33b80f12fa8fd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
SetEvent
FindResourceExW
ExitProcess
FindVolumeClose
SuspendThread
DeleteFileA
OpenEventW
HeapSize
GetCommandLineW
ResetEvent
GetModuleHandleA
ReleaseMutex
GetStartupInfoA
WriteConsoleA
OpenThread
VirtualAllocEx
CloseHandle
GetTickCount
CloseHandle
GetEnvironmentVariableW
user32
DispatchMessageW
CallWindowProcW
GetCursorInfo
DispatchMessageW
GetSysColor
GetDC
FindWindowA
GetDC
GetCaretPos
GetWindowLongA
GetClassInfoA
PeekMessageA
GetKeyState
linkinfo
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 743KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ