Static task
static1
Behavioral task
behavioral1
Sample
badf52ea4579c761c17f531895223304c83c6c032e4f9a0c9972da3c690656b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
badf52ea4579c761c17f531895223304c83c6c032e4f9a0c9972da3c690656b4.exe
Resource
win10v2004-20220901-en
General
-
Target
badf52ea4579c761c17f531895223304c83c6c032e4f9a0c9972da3c690656b4
-
Size
305KB
-
MD5
4946b20f9a2ad5440969ac5bfcbc2995
-
SHA1
031d4724a72f11c4330bed2ae9ba1759765cd0e8
-
SHA256
badf52ea4579c761c17f531895223304c83c6c032e4f9a0c9972da3c690656b4
-
SHA512
755927ebf5b6751adcedae108e2fcc6c5b2a47c90ab5d56481328f6a6c88bb90156c09f5e41edf946200f151809765560693480411b4bca4ec6417b718f47018
-
SSDEEP
6144:o2lnHHnHrLrLLrLrDCh5JNS3Rys0AMFyxXvaZreJ9lVDS2aGV6DR:oXo70LF2+S9DkGwR
Malware Config
Signatures
Files
-
badf52ea4579c761c17f531895223304c83c6c032e4f9a0c9972da3c690656b4.exe windows x86
4b3017638badc3fef242bd38a750f252
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
VirtualAlloc
GetModuleHandleW
GetShortPathNameW
DeviceIoControl
CreateFileMappingW
GetConsoleAliasA
DeleteFileA
CreateSemaphoreW
SetEnvironmentVariableA
GetProcessHeap
InitializeCriticalSection
CreateMailslotA
LoadLibraryA
WriteConsoleW
DeleteFileA
GetACP
SetVolumeLabelW
GetStringTypeW
DeleteFileA
SetCurrentDirectoryA
FatalExit
CreatePipe
mshtml
ShowModelessHTMLDialog
ShowHTMLDialog
ShowModalDialog
DllEnumClassObjects
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE