Static task
static1
Behavioral task
behavioral1
Sample
624950e80d2a659774d1cb733a4eda26286f17658c9cc4d9478fd9f2d7ab6929.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
624950e80d2a659774d1cb733a4eda26286f17658c9cc4d9478fd9f2d7ab6929.exe
Resource
win10v2004-20220812-en
General
-
Target
624950e80d2a659774d1cb733a4eda26286f17658c9cc4d9478fd9f2d7ab6929
-
Size
305KB
-
MD5
08a24508f8cb25ac12ec816453285dfb
-
SHA1
392af6adbc5b6edf7f9956d663c010d337e068a1
-
SHA256
624950e80d2a659774d1cb733a4eda26286f17658c9cc4d9478fd9f2d7ab6929
-
SHA512
ae3a5a083c81916b45e64bd4cc0efbd6b97625d383ebd4248bd9de326eb56c8808ee1070f5ab85b864567edd9491f415572bb03ab4c4d77ce542d5591dfe8ca3
-
SSDEEP
6144:iEIWPvgzzZr7EnHSSOu0kvzQ3qOgjY4DDvIbRf8is:iEIWPveZn4/ra8is
Malware Config
Signatures
Files
-
624950e80d2a659774d1cb733a4eda26286f17658c9cc4d9478fd9f2d7ab6929.exe windows x86
ec792cad42baf0b001b783a1b611f018
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
ResumeThread
GetDriveTypeW
ReadFile
GetPrivateProfileStringW
GetConsoleAliasW
GetNumberFormatW
GetCurrentProcessId
FindClose
EnterCriticalSection
GetCurrentThreadId
FindAtomW
HeapCreate
TlsGetValue
GetModuleFileNameA
LocalFree
EnumCalendarInfoW
SetLastError
GetModuleHandleA
lstrlenW
user32
CallWindowProcW
GetSysColor
GetMenuInfo
SetFocus
IsWindow
GetKeyState
GetClientRect
GetKeyboardType
GetClassInfoA
DispatchMessageA
DispatchMessageA
DrawTextA
GetCursorInfo
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ