Static task
static1
Behavioral task
behavioral1
Sample
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe
Resource
win10v2004-20220901-en
General
-
Target
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba
-
Size
55KB
-
MD5
92e0de5a76ad4d299abaeca72d3cf084
-
SHA1
b7b7af1fbdbd9059e1c9c31c5e12b78922a533a2
-
SHA256
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba
-
SHA512
85de735c51f30bfdfad897243a69aea96632dac3148488d97d475dcb497ceaee1a9dee74f2e1a2f643e6acb24648ff3bb77c67064c97cf0bf21c20cce9bdc412
-
SSDEEP
768:4JwThjRmkqQ25Eh/FRRhVf5vT+Gsk35BFqE1ZSP/0Fcr55w3WzOB+ZTEn:lEkqWjhb+Gxr1Q/+cr55r/Tc
Malware Config
Signatures
Files
-
b04e7d5a7e2681368ace863139468c880d3e6de60ec6b2ea7cdb075fb00fd4ba.exe windows x86
a7b729fe7f682c07fc1dfc6793107575
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetFileSize
WriteFile
GetProcAddress
LoadLibraryA
VirtualProtect
CloseHandle
LocalFree
ReadFile
SetFilePointer
LocalAlloc
CreateMutexA
GetModuleFileNameA
WaitForSingleObject
VirtualAllocEx
GetCurrentProcess
SetEvent
CreateEventA
Sleep
GetLastError
ConnectNamedPipe
CreateNamedPipeA
GetCurrentThread
SuspendThread
CreateThread
ExitThread
GetCurrentThreadId
GetModuleHandleA
user32
CreateDialogParamA
GetForegroundWindow
GetClassInfoExA
GetActiveWindow
wsprintfA
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ