Static task
static1
Behavioral task
behavioral1
Sample
f3f9dbdfaf98bf0fa67d32c35ed9315b8df019d2efa93dba5b8635fdf7b5fe05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3f9dbdfaf98bf0fa67d32c35ed9315b8df019d2efa93dba5b8635fdf7b5fe05.exe
Resource
win10v2004-20220901-en
General
-
Target
f3f9dbdfaf98bf0fa67d32c35ed9315b8df019d2efa93dba5b8635fdf7b5fe05
-
Size
8KB
-
MD5
556337e5f9f29036d71ddb405bcc746d
-
SHA1
5fa3019e0e589baf5cadaf68ea0e59c4d6b816aa
-
SHA256
f3f9dbdfaf98bf0fa67d32c35ed9315b8df019d2efa93dba5b8635fdf7b5fe05
-
SHA512
fb738f3d2052440501e9cf9d52d132fa9596d0fa65048c0d0e48130bd92f8e76a732525185b7b8b4d33de6819922a0aa9353039d40a9af2081aa110d08965192
-
SSDEEP
192:q1xOBXKunWkt6bqlE9rqlK1C0wO10lTZq6y6:+xoCmleaK1C01KZT
Malware Config
Signatures
Files
-
f3f9dbdfaf98bf0fa67d32c35ed9315b8df019d2efa93dba5b8635fdf7b5fe05.exe windows x86
6874cfe371130a503f2796b0019c4c8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
DeleteFileA
CreateMutexW
GetEnvironmentVariableA
GetFileSize
CreateFileA
FindClose
GetCurrentDirectoryA
ReleaseMutex
SetLastError
Sleep
GetProfileIntW
HeapSize
CloseHandle
GetStartupInfoW
HeapDestroy
InitializeCriticalSection
SuspendThread
WaitForSingleObject
HeapCreate
ResetEvent
GetTickCount
ExitProcess
GetCalendarInfoA
GetModuleHandleA
user32
GetWindowLongA
GetCursorPos
GetDC
CallWindowProcW
GetSysColor
PeekMessageA
DispatchMessageW
GetDC
MessageBoxA
GetDC
DispatchMessageW
GetClassInfoA
GetDC
dmintf
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 724KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ