Static task
static1
Behavioral task
behavioral1
Sample
1707acecb1a99171987eae40dec21e073272a16cbbafd18427f4984571a1894a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1707acecb1a99171987eae40dec21e073272a16cbbafd18427f4984571a1894a.exe
Resource
win10v2004-20220812-en
General
-
Target
1707acecb1a99171987eae40dec21e073272a16cbbafd18427f4984571a1894a
-
Size
811KB
-
MD5
056ea00e1dba70322776f713d19738a6
-
SHA1
a494a494547feafd5523f916eeb234d860cd95ee
-
SHA256
1707acecb1a99171987eae40dec21e073272a16cbbafd18427f4984571a1894a
-
SHA512
5247fc095c8f389b219eeb2c1c0d01c5e47a5aa0db433146e4b2ba8d2fc417ef3347c0a87d7fd07ca206455b425e2b76f04cdbd51b95fd26d407148af2842fc1
-
SSDEEP
24576:jJg+8xIuACmOsab0FYxG8fgN8uVsqKuL:58Qb/YG8YsqK
Malware Config
Signatures
Files
-
1707acecb1a99171987eae40dec21e073272a16cbbafd18427f4984571a1894a.exe windows x86
0012b7f0a0778f14eef9021da248f7fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
CreateDirectoryW
SetLastError
OpenSemaphoreA
RemoveDirectoryA
GlobalFree
GetModuleFileNameA
CreateDirectoryA
SetLastError
GetFileSize
EnterCriticalSection
Sleep
OpenMutexA
VirtualProtect
WriteConsoleA
ReadConsoleW
LoadLibraryA
GetCommandLineA
GetEnvironmentStringsW
SetEvent
CloseHandle
DeleteFileA
lstrlenA
GetTickCount
GetStartupInfoA
user32
DestroyMenu
IsWindow
DispatchMessageA
GetWindowLongA
DispatchMessageA
IsZoomed
FindWindowA
DrawTextW
GetClassInfoA
CallWindowProcW
PeekMessageA
SetFocus
GetSysColor
cfgbkend
DllUnregisterServer
DllCanUnloadNow
DllRegisterServer
DllGetClassObject
advapi32
RegCloseKey
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE