Static task
static1
Behavioral task
behavioral1
Sample
bb8e8a904bfa1e0c65ee0cf90368304f561b700a796982e597afac2407dc1d60.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bb8e8a904bfa1e0c65ee0cf90368304f561b700a796982e597afac2407dc1d60.exe
Resource
win10v2004-20220812-en
General
-
Target
bb8e8a904bfa1e0c65ee0cf90368304f561b700a796982e597afac2407dc1d60
-
Size
62KB
-
MD5
09784930e55d2edd3a1d9c6ee68440bd
-
SHA1
c42f01527deea76e23fff3178c1cc239a3330790
-
SHA256
bb8e8a904bfa1e0c65ee0cf90368304f561b700a796982e597afac2407dc1d60
-
SHA512
e3ceddb6a420a4e8da281854d71df87550c57bab5df04c59422adcbbe205ca26f1448281a5ba89022ca4b7725be836a2eef4acafe3c3ce63e9b7cccadda58a3d
-
SSDEEP
768:xoKrpPQ3AbuN+XJQ2YEBwKtWch+vkH1JYkyEGMAxVmG17DJ74akR4IMEOO:dNyAbekJQ2dfh+6TE7MWmGxN4jqIMB
Malware Config
Signatures
Files
-
bb8e8a904bfa1e0c65ee0cf90368304f561b700a796982e597afac2407dc1d60.exe windows x86
6fdcff1eab6845e9015811dbaf916a07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
VirtualQuery
GetVolumePathNameA
GetEnvironmentVariableA
FindResourceW
TlsGetValue
Sleep
CloseHandle
GetTimeFormatA
GetModuleHandleA
HeapCreate
lstrlenA
CloseHandle
DeleteFileW
GetStartupInfoA
ResetEvent
CreateEventA
GetCommandLineA
GetCommandLineA
CancelIo
user32
CallWindowProcA
FindWindowA
GetClassInfoA
GetWindowLongA
CreateIcon
IsWindow
GetSysColor
DispatchMessageA
DestroyMenu
IsZoomed
DispatchMessageA
DrawTextW
PeekMessageA
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE