Static task
static1
Behavioral task
behavioral1
Sample
bbf2e16f7ebd013b5195e8d2b7563f09dde32f6231a3a726b45390eac9025f1b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bbf2e16f7ebd013b5195e8d2b7563f09dde32f6231a3a726b45390eac9025f1b.exe
Resource
win10v2004-20221111-en
General
-
Target
bbf2e16f7ebd013b5195e8d2b7563f09dde32f6231a3a726b45390eac9025f1b
-
Size
37KB
-
MD5
3953851afbd0fa406d768bff91b08ac4
-
SHA1
37c7c64ab3731fd96970c56b86739eb831ed8a5e
-
SHA256
bbf2e16f7ebd013b5195e8d2b7563f09dde32f6231a3a726b45390eac9025f1b
-
SHA512
77c5aff1665186af4a1a64b08aa617885430ad88ba40e3386858838e350a0bab118599e900a1c9253014e1b61ee16f1bd208892c25a8f9ae2fe5c67489598545
-
SSDEEP
768:RieKxIHAGrljyVDGhTJk2MgHetLcJlSHtYHTh1Xi:cFOcVDG02mcA01F
Malware Config
Signatures
Files
-
bbf2e16f7ebd013b5195e8d2b7563f09dde32f6231a3a726b45390eac9025f1b.exe windows x86
1199dedc3de863adc3dfccd5a32051b7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TranslateMessage
ShowWindow
SetTimer
RegisterClassExA
PostQuitMessage
LoadImageA
UpdateWindow
LoadCursorA
KillTimer
GetMessageA
GetClientRect
EndPaint
DispatchMessageA
LoadIconA
DefWindowProcA
CreateWindowExA
BeginPaint
gdi32
SelectObject
GetObjectA
DeleteDC
CreateCompatibleDC
BitBlt
kernel32
SleepEx
OpenProcess
LoadLibraryA
GetModuleHandleA
GetCurrentProcessId
GetCommandLineA
VirtualAlloc
FindFirstFileA
FindClose
ExitProcess
DeleteFileA
CreateThread
VirtualFree
FindNextFileA
shlwapi
StrStrIA
psapi
GetModuleFileNameExA
EnumProcessModules
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 405B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ