Static task
static1
Behavioral task
behavioral1
Sample
17e30122885a4814a8426ca2990067fa381d5f3ac6c536c60be265e773d5e9d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17e30122885a4814a8426ca2990067fa381d5f3ac6c536c60be265e773d5e9d0.exe
Resource
win10v2004-20220812-en
General
-
Target
17e30122885a4814a8426ca2990067fa381d5f3ac6c536c60be265e773d5e9d0
-
Size
303KB
-
MD5
9292db0415df534b21bd40f34ba67f70
-
SHA1
9bc895065f513c37daf2a33aa6755d90e8f6cd57
-
SHA256
17e30122885a4814a8426ca2990067fa381d5f3ac6c536c60be265e773d5e9d0
-
SHA512
fbac7168bc82104f71f33521744a91d4984b3f29133eed3673d82d4eec0dcec75af6a0331b9308ef01928adb6f2a2b4a8a1a1b1007f7956fbfab374f77724814
-
SSDEEP
6144:sMzbCHal6s6Js6FXwozOYBKlwmr/QgBl29c4Y+jp1cL:rqalB6CozOz169cBe
Malware Config
Signatures
Files
-
17e30122885a4814a8426ca2990067fa381d5f3ac6c536c60be265e773d5e9d0.exe windows x86
c3ea95d520738fbe6483f578865f4e56
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WriteFile
GetModuleHandleA
GetDriveTypeA
SetLocalTime
SuspendThread
GetCommandLineA
DeleteFileA
ReadConsoleW
GlobalSize
CreateDirectoryA
GetProcessHeap
IsBadReadPtr
GetFileAttributesA
ResumeThread
HeapSize
GetStdHandle
VirtualProtect
GetPriorityClass
GetLocaleInfoA
CreatePipe
ResumeThread
user32
GetWindowLongA
DispatchMessageA
SetFocus
GetWindowTextW
DrawIcon
DestroyMenu
PeekMessageA
GetMessageA
SetCursor
wsprintfA
GetWindowLongA
SetRect
LoadCursorA
els
DllGetClassObject
DllRegisterServer
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE