Static task
static1
Behavioral task
behavioral1
Sample
4b613b901522407d3bd01a24bd03bc97b858b1a12c4c9bafaa47168ed690fbc5.exe
Resource
win7-20221111-en
General
-
Target
4b613b901522407d3bd01a24bd03bc97b858b1a12c4c9bafaa47168ed690fbc5
-
Size
217KB
-
MD5
4960a76c6d51f907c867a010c7935670
-
SHA1
26e3c90231362192b44d18db3ef151e2842f9380
-
SHA256
4b613b901522407d3bd01a24bd03bc97b858b1a12c4c9bafaa47168ed690fbc5
-
SHA512
91f073cca166bb6b8a14bdc9daaad22863b476e166193ab8776d7fad61d21898823cfbc8f05eb6abe6277e50fbea9acbec56f9c4927cba9d58dcca4b8373f139
-
SSDEEP
6144:hIIWxu+hOVTXIAQDSifjh4BOx/B9ltKGs6d9LcUTMG+tA3/:hIIWxvOVTsD5rh0O1BztKEchLty/
Malware Config
Signatures
Files
-
4b613b901522407d3bd01a24bd03bc97b858b1a12c4c9bafaa47168ed690fbc5.exe windows x86
fa12e45526172a2684b09eb32d7f72eb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadPriorityBoost
FileTimeToLocalFileTime
SearchPathW
SetFilePointer
DeleteTimerQueueEx
GetPrivateProfileSectionW
CreateDirectoryExA
SetThreadPriority
GlobalMemoryStatus
GetProcessHeap
CancelIo
_hwrite
GetNumberFormatA
CreateDirectoryW
Thread32First
GetShortPathNameW
SetProcessPriorityBoost
ResetWriteWatch
OpenFileMappingA
GetComputerNameA
RtlUnwind
SetEndOfFile
InitAtomTable
GetCurrencyFormatW
FindResourceA
SetProcessShutdownParameters
Process32NextW
GetSystemDefaultLangID
lstrcpynA
GetPrivateProfileStructA
GetThreadPriority
GetLastError
GetCommState
ReplaceFileA
GlobalLock
InterlockedIncrement
EnumTimeFormatsW
TransactNamedPipe
CompareStringA
user32
MessageBoxExA
GetMessageTime
EnableWindow
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE