Static task
static1
Behavioral task
behavioral1
Sample
60d0cb3485537356b2446a6dc21d5b336f81dbe5d831765a153518a306e85bc3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
60d0cb3485537356b2446a6dc21d5b336f81dbe5d831765a153518a306e85bc3.exe
Resource
win10v2004-20220812-en
General
-
Target
60d0cb3485537356b2446a6dc21d5b336f81dbe5d831765a153518a306e85bc3
-
Size
370KB
-
MD5
39e6cfdf112c1b2af514e296327c6086
-
SHA1
ffe1c0781e6e19a9375fb6319a5e1adad9f2043a
-
SHA256
60d0cb3485537356b2446a6dc21d5b336f81dbe5d831765a153518a306e85bc3
-
SHA512
83d8de90d4da98fc7d0569088293ac7b51e6848f2084f5aee4de4cfb8525ccb2f659ef57f416e99e59b7fc4511e8c548332393aa6a800bffb02a2da8cdc6bf2f
-
SSDEEP
6144:0m1aZCkx2o4sGmn8rv4DNpTaQzRmPQ8QiG8AKMEvxkNGkfnCJ49ijMXC:0Fqon8rvgp49VMEZMfna49ijM
Malware Config
Signatures
Files
-
60d0cb3485537356b2446a6dc21d5b336f81dbe5d831765a153518a306e85bc3.exe windows x86
445043afe54aa04faa018f7e4ce7d9e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetExitCodeProcess
ReleaseMutex
LocalSize
GetMailslotInfo
GetPrivateProfileIntW
FindVolumeClose
CloseHandle
CreateThread
ResetEvent
VirtualAlloc
GlobalFree
LocalFree
lstrlenA
FreeConsole
InterlockedExchange
CreateFileW
GetModuleHandleW
GetProcessHeap
ReadFile
user32
IsIconic
GetClientRect
EndDialog
DispatchMessageA
GetClassInfoA
GetMenu
DrawStateW
GetDlgItem
CallWindowProcW
SetFocus
GetSysColor
CreateWindowExA
GetCursorInfo
dsprop
CheckADsError
CheckADsError
ReportError
CheckADsError
CheckADsError
desk.cpl
InstallScreenSaverW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ