Static task
static1
Behavioral task
behavioral1
Sample
fb5f364fd782b602786b87114ff961ffa51c7532c732399e90070bc2c2fe7cf5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fb5f364fd782b602786b87114ff961ffa51c7532c732399e90070bc2c2fe7cf5.exe
Resource
win10v2004-20220812-en
General
-
Target
fb5f364fd782b602786b87114ff961ffa51c7532c732399e90070bc2c2fe7cf5
-
Size
303KB
-
MD5
42c276fe700eada62362652b3adbe030
-
SHA1
4312d287b6faa60ab170ca0dabc901d50b514bb1
-
SHA256
fb5f364fd782b602786b87114ff961ffa51c7532c732399e90070bc2c2fe7cf5
-
SHA512
4341d9be7b66d8b79ec275b6a196c080ab5b5a8beb73af3f2604514df1110a7232ab8f6fd974dcbe728227e88e5a5bbea998257158e848cee27d1c28d650f7b5
-
SSDEEP
6144:RRMzbLsWjFBZKooDaTlnGP482BaGdW5jJpr+LNL:MwCFBZTYa5GPD2NdqFZ+R
Malware Config
Signatures
Files
-
fb5f364fd782b602786b87114ff961ffa51c7532c732399e90070bc2c2fe7cf5.exe windows x86
e537d48519a6bdea44b6b6c305b50b7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ResumeThread
GetProcessHeap
SetEndOfFile
ReadConsoleA
GetCommandLineA
VirtualProtect
GlobalSize
ResumeThread
GetDriveTypeA
WriteFile
GetLocaleInfoA
GetPriorityClass
CreatePipe
IsBadReadPtr
CreateDirectoryA
SuspendThread
GetFileAttributesW
DeleteFileA
GetStdHandle
HeapSize
GetModuleHandleA
user32
GetWindowTextW
GetScrollInfo
GetWindowLongA
DestroyIcon
SetRect
GetWindowLongA
wsprintfA
DestroyMenu
DrawIcon
PeekMessageA
LoadCursorA
SetCursor
DispatchMessageA
els
DllUnregisterServer
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE