Static task
static1
Behavioral task
behavioral1
Sample
acdb2e511dba419dbab32354a4222ef15ac709b10bfa99f8bb7630e6c87e956c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
acdb2e511dba419dbab32354a4222ef15ac709b10bfa99f8bb7630e6c87e956c.exe
Resource
win10v2004-20220812-en
General
-
Target
acdb2e511dba419dbab32354a4222ef15ac709b10bfa99f8bb7630e6c87e956c
-
Size
228KB
-
MD5
82cf1d41379ae2c12ae0157fc4003dd0
-
SHA1
f31603fd5463dcb0620b16056f5ee39cd5365217
-
SHA256
acdb2e511dba419dbab32354a4222ef15ac709b10bfa99f8bb7630e6c87e956c
-
SHA512
dfca58c34ad795fc47743400730144b011615b037db48c99c7e8441a274862db5b589f64462525349dfe2d89e9e8609258bc04391931f9ee11dd818535d9aadc
-
SSDEEP
3072:+qVA/J8fA/JT3RuZExM6IDlJrOzZIIfEAFMZTIXs1hCyAU7W:nV+J8f+JTBcDrOZIIfdCmXs1Iyj7W
Malware Config
Signatures
Files
-
acdb2e511dba419dbab32354a4222ef15ac709b10bfa99f8bb7630e6c87e956c.exe windows x86
b72faca593b7429941e3f8ad2a089751
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
CompareStringA
GetLogicalDriveStringsW
GetTimeFormatW
GetCurrentProcess
LoadLibraryW
GetProcessId
WriteConsoleW
WaitForSingleObject
CreateNamedPipeA
ReadConsoleA
CloseHandle
GetPrivateProfileIntA
FormatMessageA
VirtualProtectEx
GetModuleHandleA
clbcatq
ComPlusMigrate
SetSetupSave
user32
IsDialogMessageW
GetDlgItemTextW
InsertMenuA
GetMessageW
CharToOemA
GetPropW
CreateDesktopW
IsZoomed
PostMessageW
FlashWindow
PeekMessageW
wsprintfA
IsMenu
LoadIconA
nddeapi
NDdeShareSetInfoA
NDdeShareAddA
NDdeShareEnumA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ