Static task
static1
Behavioral task
behavioral1
Sample
5f130658028d9001c6d8cd8dd792b8a8d71d7ef2ec51f04617ced0e1125b2f49.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f130658028d9001c6d8cd8dd792b8a8d71d7ef2ec51f04617ced0e1125b2f49.exe
Resource
win10v2004-20220812-en
General
-
Target
5f130658028d9001c6d8cd8dd792b8a8d71d7ef2ec51f04617ced0e1125b2f49
-
Size
55KB
-
MD5
0c68825d5516c2a2b7405cbed4e14bd6
-
SHA1
739615496fd8087a5556cff5d2012c171c412952
-
SHA256
5f130658028d9001c6d8cd8dd792b8a8d71d7ef2ec51f04617ced0e1125b2f49
-
SHA512
d2e43cf767e4bee689aa2ee2a27bfda3bfea6d7278b89db93fd079705d2f97924ad43ff5b034fd28041895f1a2118ae99602ed14281bfe0562f7a7c11316fd6c
-
SSDEEP
1536:SuGbVpR4k8lc3Z2kJUYHusEJJr2/TYYJn0GmQbRl7kIiJQQrA:Fmyb4Z2exTAF2/TYC0UPF
Malware Config
Signatures
Files
-
5f130658028d9001c6d8cd8dd792b8a8d71d7ef2ec51f04617ced0e1125b2f49.exe windows x86
bfed1935b8f38bbca76445e27ff61368
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
GetModuleFileNameA
IsBadWritePtr
HeapFree
SetVolumeLabelA
GetFileType
CloseHandle
AddAtomA
FindAtomA
SetEndOfFile
WaitForMultipleObjects
WriteFile
RemoveDirectoryA
FindClose
CreateSemaphoreW
ExitThread
DeleteAtom
ClearCommBreak
GetProcessHeap
GetCommandLineA
GetDriveTypeW
CreateDirectoryA
CreatePipe
RemoveDirectoryA
GetModuleHandleA
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE