Static task
static1
Behavioral task
behavioral1
Sample
813d1b3471992f22bd563a6ab4a8832446e3d905ffc56d65243612ae77f0100e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
813d1b3471992f22bd563a6ab4a8832446e3d905ffc56d65243612ae77f0100e.exe
Resource
win10v2004-20220812-en
General
-
Target
813d1b3471992f22bd563a6ab4a8832446e3d905ffc56d65243612ae77f0100e
-
Size
434KB
-
MD5
84f38677f041e603e65bd2b7b296f350
-
SHA1
55893f7d4bc0cece98cc4f0af57441ff20c77f76
-
SHA256
813d1b3471992f22bd563a6ab4a8832446e3d905ffc56d65243612ae77f0100e
-
SHA512
65e765590683b66402968d9f85594d9f6d3f806027e18fd389cd18f40e991596861124e4a08d69df701c1e3e38b632e2f5353e444f09634ee09ca2f0c3c3c315
-
SSDEEP
12288:v+2/R6PiZLaoc+q40ZR6z3/VjzxPRshoQQ6emnnLA:v+2pPZLaClW4z3/V5uZQSn8
Malware Config
Signatures
Files
-
813d1b3471992f22bd563a6ab4a8832446e3d905ffc56d65243612ae77f0100e.exe windows x86
826113063d6ab4a1801099f1213773f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
WaitForMultipleObjects
HeapSize
RemoveDirectoryW
SetLastError
CreateFileA
GetLocalTime
GetModuleHandleA
OpenThread
FindClose
CloseHandle
GetTickCount
GetTickCount
ReleaseMutex
WaitForSingleObject
GetFileAttributesA
HeapCreate
GetCurrentDirectoryA
GetStartupInfoW
CreateMutexW
GetConsoleTitleW
ExitProcess
GetStdHandle
Sleep
GetEnvironmentVariableA
user32
PeekMessageA
GetDC
FillRect
CallWindowProcW
GetWindowLongA
MessageBoxA
DispatchMessageW
GetDC
GetSysColor
GetClassInfoA
GetDC
DispatchMessageW
FindWindowW
vbajet32
VBAGetExprSrv
VBAGetExprSrv
VBAGetExprSrv
VBAGetExprSrv
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 428KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ