Static task
static1
Behavioral task
behavioral1
Sample
4732e288edf999ebb50abf756792f7eda1ac189542ad7096cda6c883cbef8711.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4732e288edf999ebb50abf756792f7eda1ac189542ad7096cda6c883cbef8711.exe
Resource
win10v2004-20220812-en
General
-
Target
4732e288edf999ebb50abf756792f7eda1ac189542ad7096cda6c883cbef8711
-
Size
305KB
-
MD5
9c22bc0bb754f5df2669d6a1dd061646
-
SHA1
7970fe76c7b2f02abc6db7091355cb7c1cff7766
-
SHA256
4732e288edf999ebb50abf756792f7eda1ac189542ad7096cda6c883cbef8711
-
SHA512
3e2d3572857796e8bb57789fd6c569a0c4ff16f4347a90d60a03ac40b4181225cc65241368b39fbfe66297d339b76800ca6ff7e54527c2534764cd60c1a6b8cc
-
SSDEEP
6144:As/1FLfzXLy4S1tu9h7+VnGxVRWxLoFuttOie8RbM2d:F9t7y4S1InmGxVUUuttFi2
Malware Config
Signatures
Files
-
4732e288edf999ebb50abf756792f7eda1ac189542ad7096cda6c883cbef8711.exe windows x86
a1eaf5e3de08574825892f865ad1ad61
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetModuleFileNameA
LocalFree
EnterCriticalSection
SetLastError
GetCurrentThreadId
GetFileAttributesA
ResumeThread
FindClose
GetConsoleAliasW
SetEvent
CreateMailslotA
lstrlenA
FindAtomW
EnumCalendarInfoW
GetModuleHandleA
GetDriveTypeW
GetPrivateProfileStringW
ReadFile
HeapCreate
user32
GetMenuInfo
GetClientRect
GetKeyState
DispatchMessageA
DrawTextW
SetFocus
IsWindow
GetCursorInfo
GetSysColor
DispatchMessageA
GetKeyboardType
GetClassInfoA
CallWindowProcW
admparse
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ