Static task
static1
Behavioral task
behavioral1
Sample
062499bb44feda0e977c4c816b1ac7390956091eba1b8cc409b38d3aab9f5026.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
062499bb44feda0e977c4c816b1ac7390956091eba1b8cc409b38d3aab9f5026.exe
Resource
win10v2004-20220901-en
General
-
Target
062499bb44feda0e977c4c816b1ac7390956091eba1b8cc409b38d3aab9f5026
-
Size
799KB
-
MD5
2823ecd4bb5f022d1713dab54e0da606
-
SHA1
36835fe3461c6192869e221dc4a4ffbde640511c
-
SHA256
062499bb44feda0e977c4c816b1ac7390956091eba1b8cc409b38d3aab9f5026
-
SHA512
3c7d62bb8141af4566c557504d2de01505d4c7e0f5ff0a807e0c5a7e649373c3728e52cd1e4f315e3de90c12fc6f59c5e1e0b14fcf0cd5aef398f0f9a80d6e40
-
SSDEEP
24576:RDQZvnjB5lh7D3oM5suGqcOOawgHQbq4gVVSd:VgrB5XDBcD9gHQe4gf
Malware Config
Signatures
Files
-
062499bb44feda0e977c4c816b1ac7390956091eba1b8cc409b38d3aab9f5026.exe windows x86
93ab20d61ea046db081b6946835a27fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreatePipe
DeleteFileA
GetLocaleInfoA
VirtualProtect
GetProcessHeap
IsBadReadPtr
ResumeThread
GetStdHandle
GlobalSize
GetFileAttributesW
lstrlenA
ReadConsoleA
WriteFile
SuspendThread
HeapSize
CreateDirectoryA
GetPriorityClass
GetCommandLineA
GetDriveTypeA
SetEndOfFile
GetModuleHandleA
user32
LoadCursorA
GetWindowLongA
DestroyIcon
DispatchMessageA
GetScrollInfo
SetCursor
wsprintfA
DestroyMenu
PeekMessageA
DrawIcon
SetRect
GetWindowTextW
GetWindowLongA
els
DllGetClassObject
DllUnregisterServer
DllCanUnloadNow
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE