Static task
static1
Behavioral task
behavioral1
Sample
5fccb60ea6b06bbed4a9b8f65150ffe08be903e729609630a126597c48c1c6a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fccb60ea6b06bbed4a9b8f65150ffe08be903e729609630a126597c48c1c6a0.exe
Resource
win10v2004-20221111-en
General
-
Target
5fccb60ea6b06bbed4a9b8f65150ffe08be903e729609630a126597c48c1c6a0
-
Size
304KB
-
MD5
e5cf25babafc7df4ffe691fd682f99ab
-
SHA1
7c75c17c6c57a0728ac25feb34d3fe400575a3fe
-
SHA256
5fccb60ea6b06bbed4a9b8f65150ffe08be903e729609630a126597c48c1c6a0
-
SHA512
a2120418f053774ee90e349276a8db6c7ffb343edce949742151ee564632883fbb896604e8a945527478729504d9350a6a23916430e7511dbe84ab1f77c2863c
-
SSDEEP
6144:RPt73mIropJWYp+GqDjWXSNf4jsRiBmat08OM7gxhOfTA+2Xy5yVO5xxNN:RRmsopJWYQ2zjsABma++7gxhO74yCMNN
Malware Config
Signatures
Files
-
5fccb60ea6b06bbed4a9b8f65150ffe08be903e729609630a126597c48c1c6a0.exe windows x86
67e3411749edca5845064fc1e148c1f7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
CloseHandle
GetComputerNameW
GetModuleHandleW
ResetEvent
GetSystemTime
CreateFileA
GetCommandLineW
GetTickCount
FindAtomW
SuspendThread
GetPrivateProfileIntA
ExitProcess
GetDiskFreeSpaceW
GetTickCount
lstrlenA
GetFileAttributesA
VirtualAlloc
LocalFree
LoadLibraryA
user32
CallWindowProcA
DestroyCaret
GetClientRect
GetMenu
EndDialog
DrawStateA
GetCaretPos
FillRect
DispatchMessageA
CreateWindowExA
CloseWindow
GetDlgItem
GetClassInfoA
rasapi32
RasDialA
DwCloneEntry
RasDeleteEntryA
DwEnumEntryDetails
DwRasUninitialize
adsnt
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ