Static task
static1
Behavioral task
behavioral1
Sample
304987808b6551973ef09af1c05788200491d157d5adc74b9b25075b00c722ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
304987808b6551973ef09af1c05788200491d157d5adc74b9b25075b00c722ef.exe
Resource
win10v2004-20221111-en
General
-
Target
304987808b6551973ef09af1c05788200491d157d5adc74b9b25075b00c722ef
-
Size
381KB
-
MD5
ab18c02bb65c5811f685efbeee60d410
-
SHA1
3b1a2b3ccbf9f3136bdf0355335d192d7a421091
-
SHA256
304987808b6551973ef09af1c05788200491d157d5adc74b9b25075b00c722ef
-
SHA512
9c5ae58664bbb20597c88a535451b2c995fe2112fe2a18136cfd6df0aa943d95fcc28f44c2369802a4a61dd61c957562f8d251e61568e61beb28a169f8cf9c6a
-
SSDEEP
6144:75bRMvMt0HEAT1fxhcMxW2pL7lv6w2K/PkFtR6sFHYnHFWhTyHVEOSQTQiJY7jMb:5RMvRHEAJLjpFv6w2K/PkFtlVMHFWg10
Malware Config
Signatures
Files
-
304987808b6551973ef09af1c05788200491d157d5adc74b9b25075b00c722ef.exe windows x86
1f5652b70b44f18eba566d380b31fcff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
GetDriveTypeA
GetCurrentThreadId
lstrlenW
ReleaseMutex
InitializeCriticalSection
TlsGetValue
CloseHandle
GetFileTime
GetPrivateProfileStringA
GetCurrentProcessId
HeapCreate
LocalFree
GlobalFlags
FindClose
LoadLibraryW
GetEnvironmentVariableW
CreateEventW
IsBadStringPtrW
ReleaseMutex
user32
EndDialog
GetClassInfoA
CallWindowProcW
CreateWindowExA
SetFocus
DrawTextA
GetSysColor
DrawStateW
GetClientRect
GetSysColor
DispatchMessageA
GetKeyboardType
IsWindow
pnrpnsp
NSPStartup
NSPStartup
NSPStartup
NSPStartup
NSPStartup
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ