Static task
static1
Behavioral task
behavioral1
Sample
c60f7e20083b4562de9dea26e149de490d0baa5bccfbb9baefcaa94a8d4c414a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c60f7e20083b4562de9dea26e149de490d0baa5bccfbb9baefcaa94a8d4c414a.exe
Resource
win10v2004-20220812-en
General
-
Target
c60f7e20083b4562de9dea26e149de490d0baa5bccfbb9baefcaa94a8d4c414a
-
Size
305KB
-
MD5
24bf48b9ce8862a38531cf61b682eaa2
-
SHA1
67fa6997c90e6d4cbda52c51142f4beeba53a700
-
SHA256
c60f7e20083b4562de9dea26e149de490d0baa5bccfbb9baefcaa94a8d4c414a
-
SHA512
35a502596c908e9e3c54991cefbb330e02833332956e43ac0bf10ab7b9475ee68b74b952cd19cf72739e24b1b32f73a692d11749f7d0de207b000fdc3e48295c
-
SSDEEP
6144:m/rAac3K83SaYm7tdebobE/F8onwqnlN+5u+0Y4bXD:6jcnUm7/j+O0cX4bT
Malware Config
Signatures
Files
-
c60f7e20083b4562de9dea26e149de490d0baa5bccfbb9baefcaa94a8d4c414a.exe windows x86
f1d532ad33d885084f02487ca875a3d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
GetPrivateProfileStringW
GetModuleFileNameA
ResumeThread
SetEvent
GetModuleHandleA
GlobalFree
ReadFile
FindClose
HeapCreate
CreateMailslotA
GetConsoleAliasW
LocalFree
SetLastError
FindAtomW
GetCurrentProcessId
EnumCalendarInfoW
GetCurrentThreadId
GetFileAttributesA
GetDriveTypeW
user32
DispatchMessageA
GetMenuInfo
DrawTextW
GetKeyState
SetFocus
GetKeyboardType
GetClassInfoA
GetSysColor
GetCursorInfo
DispatchMessageA
GetClientRect
IsWindow
CallWindowProcW
asycfilt
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ