Static task
static1
Behavioral task
behavioral1
Sample
317eee6e6146419cd13ae60b5ae4a6b9f3928d56b049ad93e0786ca9ac1288f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
317eee6e6146419cd13ae60b5ae4a6b9f3928d56b049ad93e0786ca9ac1288f3.exe
Resource
win10v2004-20220812-en
General
-
Target
317eee6e6146419cd13ae60b5ae4a6b9f3928d56b049ad93e0786ca9ac1288f3
-
Size
85KB
-
MD5
81fbaed66e951cb3137dac91752e5a70
-
SHA1
daf03537f2ca8aeb00005dc8a3ddc93ed54a476d
-
SHA256
317eee6e6146419cd13ae60b5ae4a6b9f3928d56b049ad93e0786ca9ac1288f3
-
SHA512
d1b23d5a3cfa61b67ea567843a0f87ed0a80323983e5ce7805f7a74b5c4887ca8cb3661c027e8b4c036513f51caf694ad4b158c4b28ff37da2621811ddd873c9
-
SSDEEP
1536:bubLgaLaRo6vtIRv/myXSx9EHgnLG4KrtdPN5mA:bLveRXmhEHuqhdF5
Malware Config
Signatures
Files
-
317eee6e6146419cd13ae60b5ae4a6b9f3928d56b049ad93e0786ca9ac1288f3.exe windows x86
82ecc653d0942f75e77a48e5c7da0070
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetCommandLineA
ResumeThread
GetModuleHandleA
GetProcessHeap
WriteFile
ReadConsoleW
VirtualProtect
GetDriveTypeA
HeapSize
GetStdHandle
DeleteFileA
ResumeThread
CreateDirectoryA
GetFileAttributesW
SuspendThread
GetLocaleInfoA
SetEndOfFile
IsBadReadPtr
GlobalSize
CreatePipe
GetPriorityClass
user32
DestroyIcon
LoadCursorA
SetRect
GetScrollInfo
SetCursor
GetWindowTextW
DrawIcon
PeekMessageA
wsprintfA
GetWindowLongA
GetWindowLongA
DispatchMessageA
DestroyMenu
els
DllCanUnloadNow
DllRegisterServer
DllGetClassObject
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE