Static task
static1
Behavioral task
behavioral1
Sample
beb262e942d7acaea015e161b87d85e6260d8aca972c6bbd18aea6afa70631a9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
beb262e942d7acaea015e161b87d85e6260d8aca972c6bbd18aea6afa70631a9.exe
Resource
win10v2004-20221111-en
General
-
Target
beb262e942d7acaea015e161b87d85e6260d8aca972c6bbd18aea6afa70631a9
-
Size
370KB
-
MD5
8850eec0bd0c178b46864038615dabb0
-
SHA1
00cb79fcd28360f566b87289d55802cdb616470f
-
SHA256
beb262e942d7acaea015e161b87d85e6260d8aca972c6bbd18aea6afa70631a9
-
SHA512
9e70587c809feabfb2ed89cee43f7faaaf8b546f7cd1ae55ffcc86ea58fce44cc436adcbeee99074a4f1485d4c5e094f30fd700a860b204108a79236d00f734f
-
SSDEEP
6144:hts6RMrt0HEAT1fxhcMxW2pL7lv6w2K/PkFtR6sFHYnHFWhTyHVEOSQTQiJY7jMb:hm6RM2HEAJLjpFv6w2K/PkFtlVMHFWgC
Malware Config
Signatures
Files
-
beb262e942d7acaea015e161b87d85e6260d8aca972c6bbd18aea6afa70631a9.exe windows x86
f04cba15e1c79f3412c28f5a68c0fa23
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
TlsGetValue
InitializeCriticalSection
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableW
IsBadStringPtrW
CreateEventW
WriteFile
FindAtomA
LocalFree
LoadLibraryW
GetFileTime
HeapCreate
ReleaseMutex
GetPrivateProfileStringA
GlobalFlags
FindClose
lstrlenW
ReleaseMutex
user32
DrawTextA
GetClassInfoA
EndDialog
GetClientRect
DispatchMessageA
GetSysColor
DrawStateW
IsWindow
CreateWindowExA
GetKeyboardType
GetSysColor
SetFocus
CallWindowProcW
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
cryptui
LocalEnroll
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ