Static task
static1
Behavioral task
behavioral1
Sample
160775720b7682af56779c62467f7f1ebd9ed277c5f6e0c098ed6e39479c0833.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
160775720b7682af56779c62467f7f1ebd9ed277c5f6e0c098ed6e39479c0833.exe
Resource
win10v2004-20221111-en
General
-
Target
160775720b7682af56779c62467f7f1ebd9ed277c5f6e0c098ed6e39479c0833
-
Size
359KB
-
MD5
b66b58af19cd1509b87b5f9ec5dd7617
-
SHA1
f59a110dcec8d590a7a1519f36b15460e01ce956
-
SHA256
160775720b7682af56779c62467f7f1ebd9ed277c5f6e0c098ed6e39479c0833
-
SHA512
359db164cc3cdf194371f05345a246d7a6279c1bff0ee48ed0a1f047064b3cca54723faff395d9dd00d5a6ce0a9ff2bfeba708a409f29734b5541032c7d5b7af
-
SSDEEP
6144:i2IHxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVV2+:i3R9QI0Ay6fYvzEOe2KNSQ6l83zBzsu+
Malware Config
Signatures
Files
-
160775720b7682af56779c62467f7f1ebd9ed277c5f6e0c098ed6e39479c0833.exe windows x86
d504483ce75c8031fb70d5557628344f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
FindAtomW
GetSystemTime
ResetEvent
LocalFree
CloseHandle
GetDiskFreeSpaceW
GetFileAttributesA
ReleaseMutex
GetModuleHandleW
GetComputerNameW
GetTickCount
HeapCreate
ReleaseMutex
GetTickCount
ExitProcess
GetDriveTypeA
GetCommandLineW
lstrlenA
CreateFileA
user32
GetCaretPos
GetComboBoxInfo
CloseWindow
EndDialog
DispatchMessageA
CreateWindowExA
GetClassInfoA
DrawStateA
DestroyCaret
FillRect
CallWindowProcA
GetMenu
GetDlgItem
rasapi32
RasDeleteEntryA
DwEnumEntryDetails
RasDialA
DwRasUninitialize
DwCloneEntry
modemui
CountryRunOnce
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ