Static task
static1
Behavioral task
behavioral1
Sample
8fa98a410145e7e069ca860118dfadd08b43d587d1a0452bc2b8d3dd445b6af0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8fa98a410145e7e069ca860118dfadd08b43d587d1a0452bc2b8d3dd445b6af0.exe
Resource
win10v2004-20221111-en
General
-
Target
8fa98a410145e7e069ca860118dfadd08b43d587d1a0452bc2b8d3dd445b6af0
-
Size
359KB
-
MD5
086e5056221c435c870338ed49547992
-
SHA1
623cd735eb770690904c819f2136511d303efe58
-
SHA256
8fa98a410145e7e069ca860118dfadd08b43d587d1a0452bc2b8d3dd445b6af0
-
SHA512
f69a4a63e04b0be1bf1ae830e64cbd9edf16c22f39fab8feed0043fc49fb0b0f1314ca3984a34843cf3a661e0e646e66ab8b941c6442a361937664100e4c9df4
-
SSDEEP
6144:vyugqHxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVN:vtR9QI0Ay6fYvzEOe2KNSQ6l83zBzsu+
Malware Config
Signatures
Files
-
8fa98a410145e7e069ca860118dfadd08b43d587d1a0452bc2b8d3dd445b6af0.exe windows x86
b3b88beef4f7c818e1743f09a9c316af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
GetTickCount
HeapCreate
ExitProcess
GetDiskFreeSpaceW
GetFileAttributesA
GetModuleHandleW
LocalFree
GetComputerNameW
CreateFileA
GetSystemTime
GetDriveTypeA
lstrlenA
LoadLibraryA
FindAtomW
ReleaseMutex
ResetEvent
GetCommandLineW
GetTickCount
CloseHandle
user32
CallWindowProcA
EndDialog
DispatchMessageA
GetComboBoxInfo
GetDlgItem
FillRect
DestroyCaret
CloseWindow
GetCaretPos
CreateWindowExA
DrawStateA
GetClassInfoA
GetMenu
rasapi32
RasDialA
RasDeleteEntryA
DwEnumEntryDetails
DwCloneEntry
DwRasUninitialize
modemui
CountryRunOnce
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ