Static task
static1
Behavioral task
behavioral1
Sample
c383104a09a4d6b4b40b68d1baf066888dfa45a9b6fa02b6293b2e19d5adea2a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c383104a09a4d6b4b40b68d1baf066888dfa45a9b6fa02b6293b2e19d5adea2a.exe
Resource
win10v2004-20220812-en
General
-
Target
c383104a09a4d6b4b40b68d1baf066888dfa45a9b6fa02b6293b2e19d5adea2a
-
Size
302KB
-
MD5
08bc3d87a932964d1e1379b837403230
-
SHA1
e4179b4f60f06a4246396611737a6369eed3fea1
-
SHA256
c383104a09a4d6b4b40b68d1baf066888dfa45a9b6fa02b6293b2e19d5adea2a
-
SHA512
a7ed35c40168e3c383464c8911c316be185c294b20511dd33f8ac8fe51824b4c7368608ea443ddde91bc611630a23ba2e6db84604e37eb1eabaad414d6add9c5
-
SSDEEP
6144:GlvuoEIcjwF1eKo6FNsmEJphN/b+aGxxmns3dCKLQDsv:G4oUjErrsX5bKxJdCYV
Malware Config
Signatures
Files
-
c383104a09a4d6b4b40b68d1baf066888dfa45a9b6fa02b6293b2e19d5adea2a.exe windows x86
6517dbf91a24941d5a2ff23d1a086644
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
Sleep
CreateMutexW
DeleteFileA
SetLastError
GetStdHandle
WaitForMultipleObjects
CloseHandle
OpenThread
GetConsoleTitleW
CreateFileA
ReleaseMutex
GetCurrentDirectoryA
RemoveDirectoryW
GetTickCount
ExitProcess
GetTickCount
GetEnvironmentVariableA
GetFileAttributesA
GetStartupInfoW
WaitForSingleObject
GetLocalTime
HeapSize
HeapCreate
FindClose
user32
GetDC
MessageBoxA
GetSysColor
GetDC
FindWindowW
CallWindowProcW
PeekMessageA
DispatchMessageW
FillRect
GetClassInfoA
GetDC
GetWindowLongA
DispatchMessageW
vbajet32
VBAGetExprSrv
VBAGetExprSrv
VBAGetExprSrv
VBAGetExprSrv
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ