Static task
static1
Behavioral task
behavioral1
Sample
ba10e36ee3a03fb3839e1ed4d5741e191275d41c8f5f8bf76de6e65af3bd277d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba10e36ee3a03fb3839e1ed4d5741e191275d41c8f5f8bf76de6e65af3bd277d.exe
Resource
win10v2004-20220901-en
General
-
Target
ba10e36ee3a03fb3839e1ed4d5741e191275d41c8f5f8bf76de6e65af3bd277d
-
Size
48KB
-
MD5
4d4fb501abe3f63f150db41edfb42276
-
SHA1
df72dc33019b9254da34bc35256389c6a1410d3b
-
SHA256
ba10e36ee3a03fb3839e1ed4d5741e191275d41c8f5f8bf76de6e65af3bd277d
-
SHA512
62a00f58fee5d1e18850bb6d26ccf2317b82eb879113b1e966018e9c901ae382e16944dfcf1d85c409d87c203146a5006e4ec41539da49049ff05169c7c23ad9
-
SSDEEP
768:6FvuD4GDnOZ65q/VpHQvtVFS354xssjwOUTBbT1kxeTfHfLGhahIBnFuu7S4xPaL:W2D4GDOFVdStrd5OPkxeTf/iahkxCL
Malware Config
Signatures
Files
-
ba10e36ee3a03fb3839e1ed4d5741e191275d41c8f5f8bf76de6e65af3bd277d.exe windows x86
7bae756cc7dbc6a35084c99cc27c562f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
esent
JetCloseTable
JetCommitTransaction
JetCloseFile
JetBeginTransaction
user32
wsprintfW
SetFocus
LoadCursorA
DefDlgProcA
GetClassInfoA
MessageBoxW
LoadStringA
IsDialogMessageA
IsCharLowerW
FindWindowW
GetMessageA
CharToOemA
LoadBitmapA
kernel32
OpenMutexW
GetEnvironmentVariableA
GetProcAddress
OpenSemaphoreA
CopyFileW
ReplaceFileA
GetFileSize
CreateDirectoryA
LoadLibraryW
CreateMutexA
DeviceIoControl
SetErrorMode
GetLogicalDriveStringsA
FormatMessageA
GetProcessHeap
CreateSemaphoreW
GetLocalTime
HeapAlloc
SetEnvironmentVariableW
WaitForSingleObjectEx
TlsGetValue
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ