Static task
static1
Behavioral task
behavioral1
Sample
b7165eeb944a86fcfc89897e75bd6223cb308266d9d7fc08ba26400d217a3503.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b7165eeb944a86fcfc89897e75bd6223cb308266d9d7fc08ba26400d217a3503.exe
Resource
win10v2004-20221111-en
General
-
Target
b7165eeb944a86fcfc89897e75bd6223cb308266d9d7fc08ba26400d217a3503
-
Size
297KB
-
MD5
712e683132506cde8d540aef47545f6b
-
SHA1
efcf14d90f8e5139bc8c887c0c9331b94fbe22e7
-
SHA256
b7165eeb944a86fcfc89897e75bd6223cb308266d9d7fc08ba26400d217a3503
-
SHA512
40326621efcbf2492abea5edd5246ddb864c052ac4ecab64891ac05fdb174c3761eaee20593295bc89cb853e5c8bb9285a6e068f6c5f8d0ca3f9f00cedf87c42
-
SSDEEP
6144:1YeH4vkamjPcJmd02LpRyFk+vbSn56cTse0pADsOjqu:1YeH4PmSsjLpRX+GZ0Mheu
Malware Config
Signatures
Files
-
b7165eeb944a86fcfc89897e75bd6223cb308266d9d7fc08ba26400d217a3503.exe windows x86
f3024a4541aa4eaac271344b46f62c8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetEnvironmentVariableA
InterlockedDecrement
GetModuleHandleW
CloseHandle
FindResourceW
GetExitCodeProcess
InterlockedIncrement
Heap32First
GetDiskFreeSpaceW
LoadLibraryA
ReadFileEx
GetDiskFreeSpaceW
WaitForSingleObject
Sleep
GetCurrentDirectoryA
GetStringTypeW
lstrcmpA
GetLastError
VirtualAlloc
lstrcpyW
GetPrivateProfileIntA
apphelp
AllowPermLayer
ApphelpCheckIME
ApphelpCheckExe
SdbCreateMsiTransformFile
clbcatq
ComPlusMigrate
CheckMemoryGates
DllGetClassObject
DllGetClassObject
CheckMemoryGates
SetupOpen
SetSetupSave
SetSetupSave
ComPlusMigrate
SetupOpen
ComPlusMigrate
CheckMemoryGates
SetupOpen
version
VerFindFileA
Sections
.text Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 296KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE