Static task
static1
Behavioral task
behavioral1
Sample
907fc3a4803261ebb230093e2c26e52ab16c58c30debc0a8132236a64b2f9504.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
907fc3a4803261ebb230093e2c26e52ab16c58c30debc0a8132236a64b2f9504.exe
Resource
win10v2004-20220812-en
General
-
Target
907fc3a4803261ebb230093e2c26e52ab16c58c30debc0a8132236a64b2f9504
-
Size
799KB
-
MD5
f2c3787fe12fe147101cb95212c3bbe3
-
SHA1
dae602dae9a56fe11fed36336d2df60cff314525
-
SHA256
907fc3a4803261ebb230093e2c26e52ab16c58c30debc0a8132236a64b2f9504
-
SHA512
aea72e53c7b72d4110d6e2031dbe37cea32825cf42316601638215bcffe8f848b445fb87102b89a3ce4e97bab271404322cf5f4368d4812908d407da62bc7b65
-
SSDEEP
24576:HzxA5JfTUfQO7vN1cQOM6aHwkFhFbR7LIKHKQjemo0VxfNM:1A5FTUf/7F1cQOowkhbBuQjzVw
Malware Config
Signatures
Files
-
907fc3a4803261ebb230093e2c26e52ab16c58c30debc0a8132236a64b2f9504.exe windows x86
d4478d4ca559f57ee7bf14aebee0b02c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetFileAttributesA
GetStdHandle
CreatePipe
GetPriorityClass
GetProcessHeap
SetLocalTime
VirtualProtect
ResumeThread
GlobalSize
DeleteFileA
GetModuleHandleA
HeapSize
WriteFile
CreateDirectoryA
ResumeThread
GetDriveTypeA
IsBadReadPtr
ReadConsoleW
GetCommandLineA
SuspendThread
GetLocaleInfoA
user32
SetCursor
GetWindowLongA
LoadCursorA
GetMessageA
DestroyMenu
DispatchMessageA
SetFocus
PeekMessageA
GetWindowTextW
SetRect
wsprintfA
GetWindowLongA
DrawIcon
els
DllGetClassObject
DllRegisterServer
DllRegisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 692KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 793KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE