Static task
static1
Behavioral task
behavioral1
Sample
b4607e2e16a2517fd3366065f2a723ba0c4d018a56826e4d50093ffb57c418ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4607e2e16a2517fd3366065f2a723ba0c4d018a56826e4d50093ffb57c418ac.exe
Resource
win10v2004-20221111-en
General
-
Target
b4607e2e16a2517fd3366065f2a723ba0c4d018a56826e4d50093ffb57c418ac
-
Size
163KB
-
MD5
15b9302a2f3e30442685c10224335b2b
-
SHA1
d65d7a0d2a271567d05b600b4f96acd5165c4dd7
-
SHA256
b4607e2e16a2517fd3366065f2a723ba0c4d018a56826e4d50093ffb57c418ac
-
SHA512
9a912397c94914284698f6683da5026b160ac8562d9f716526201c207c6fa9b10d3186eef68d77d59574a71752e0521a5fc7fb2d1a4ba90229a650d817c336b2
-
SSDEEP
3072:bMqnYNOeTr8+L9p6FglgxwaaQE6oD6I7s1thOH16W63fIn6sM0i:bMqkOeTY+L9p4xwaa6es1thOKPIn7M0
Malware Config
Signatures
Files
-
b4607e2e16a2517fd3366065f2a723ba0c4d018a56826e4d50093ffb57c418ac.exe windows x86
488eea61465f89198e617faeaafcf20f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateDirectoryA
EnterCriticalSection
EnumResourceLanguagesA
ExitProcess
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
HeapAlloc
LeaveCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
RemoveDirectoryA
RtlUnwind
SetLastError
SetUnhandledExceptionFilter
TlsGetValue
UnmapViewOfFile
lstrcmpA
lstrlenA
user32
MessageBoxA
MessageBoxIndirectA
EmptyClipboard
DefDlgProcA
advapi32
RegOpenKeyExA
RegLoadKeyA
RegEnumKeyA
ole32
CoUninitialize
OleInitialize
OleUninitialize
WriteFmtUserTypeStg
CoCreateGuid
CoCreateInstance
CoDisconnectObject
CoGetClassObject
CoInitialize
wininet
InternetSetFilePointer
InternetSetOptionExA
InternetWriteFile
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetGetCookieA
InternetCrackUrlA
InternetConnectA
InternetCloseHandle
InternetCanonicalizeUrlA
HttpSendRequestA
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetReadFile
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
Shell_NotifyIconA
ShellExecuteW
ShellExecuteExW
ShellExecuteExA
ShellExecuteA
SHGetPathFromIDListA
SHBindToParent
Sections
.text Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ