Static task
static1
Behavioral task
behavioral1
Sample
80ebd12ae16dc00da23cacec090b276e5f001ddf1e580ff6bd1cbca97a082587.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
80ebd12ae16dc00da23cacec090b276e5f001ddf1e580ff6bd1cbca97a082587.exe
Resource
win10v2004-20220901-en
General
-
Target
80ebd12ae16dc00da23cacec090b276e5f001ddf1e580ff6bd1cbca97a082587
-
Size
799KB
-
MD5
085d6f59d0c57fdbdc28f403ab9f3e06
-
SHA1
51161893dd8db4c702c1fcac38e050025af1b90e
-
SHA256
80ebd12ae16dc00da23cacec090b276e5f001ddf1e580ff6bd1cbca97a082587
-
SHA512
df423c7926fb00917b5055de26e3833688d3f508fbac3dddf5fb1b5c647a84cc1a3c589b85058f781a5cc6138f5bb37bbf28a9e963d3ebce07f357e4ef1dd1de
-
SSDEEP
24576:xnLaK+lVtkXH1vRh19gL0zwTx5uW7lf1:92K+zCD9gLswdkCf
Malware Config
Signatures
Files
-
80ebd12ae16dc00da23cacec090b276e5f001ddf1e580ff6bd1cbca97a082587.exe windows x86
a59fdcb6535787fa7e8d93cedb59e9bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetLocaleInfoA
GetStdHandle
CreatePipe
SetEndOfFile
GetProcessHeap
GetFileAttributesW
ResumeThread
HeapSize
GetDriveTypeA
ReadConsoleA
CreateDirectoryA
ResumeThread
SuspendThread
GetCommandLineA
WriteFile
VirtualProtect
IsBadReadPtr
DeleteFileA
GetPriorityClass
GetModuleHandleA
GlobalSize
user32
DestroyMenu
GetWindowLongA
DrawIcon
GetWindowLongA
DestroyIcon
wsprintfA
GetScrollInfo
SetCursor
DispatchMessageA
LoadCursorA
SetRect
PeekMessageA
GetWindowTextW
els
DllUnregisterServer
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE