Static task
static1
Behavioral task
behavioral1
Sample
b22186dcb105e31918b2477d46fa3cc87ec86d569c5c3961d6602196ce130601.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b22186dcb105e31918b2477d46fa3cc87ec86d569c5c3961d6602196ce130601.exe
Resource
win10v2004-20221111-en
General
-
Target
b22186dcb105e31918b2477d46fa3cc87ec86d569c5c3961d6602196ce130601
-
Size
305KB
-
MD5
14fde333cd9c97e3b4701a4aa04134d4
-
SHA1
90afd3ac1c042a7248761f8d0a624ffeb46b1917
-
SHA256
b22186dcb105e31918b2477d46fa3cc87ec86d569c5c3961d6602196ce130601
-
SHA512
a05c17bfb4b058eb7bb3fbd9e2e07a00cb81c46203d2f287431b3666aa913f9816c50a72411260578490091d53ff43ca3f93d69a0462bba522d241f1517c5d86
-
SSDEEP
6144:d4rH0SWZl4ESexlEqJ8yH6C634bYZyF2mrpqZA7IoZ:sH0HPTnHJ8o6D4bY4FJYW7Im
Malware Config
Signatures
Files
-
b22186dcb105e31918b2477d46fa3cc87ec86d569c5c3961d6602196ce130601.exe windows x86
43333a583a37686c118363cb037fae20
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetNumberFormatW
LocalFree
FindClose
lstrlenW
GetCurrentProcessId
FindAtomW
GetPrivateProfileStringW
GetConsoleAliasW
GetModuleHandleA
ResumeThread
SetEvent
GetDriveTypeW
EnterCriticalSection
HeapCreate
GetCurrentThreadId
SetLastError
TlsGetValue
GetModuleFileNameA
EnumCalendarInfoW
user32
GetSysColor
GetKeyState
GetClassInfoA
SetFocus
DispatchMessageA
DrawTextA
GetKeyboardType
GetMenuInfo
GetClientRect
DispatchMessageA
GetCursorInfo
IsWindow
CallWindowProcW
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ