Static task
static1
Behavioral task
behavioral1
Sample
b707c7b025d1e3fdc38245d877930e2c4d080dac6928f33bf265f6dd79fa9242.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b707c7b025d1e3fdc38245d877930e2c4d080dac6928f33bf265f6dd79fa9242.exe
Resource
win10v2004-20220901-en
General
-
Target
b707c7b025d1e3fdc38245d877930e2c4d080dac6928f33bf265f6dd79fa9242
-
Size
391KB
-
MD5
ef897795bdbd75cb5ec25fd035b0bb5a
-
SHA1
1903a28e2acaa5c3f3d0fdeb23d5502923f56ee4
-
SHA256
b707c7b025d1e3fdc38245d877930e2c4d080dac6928f33bf265f6dd79fa9242
-
SHA512
201f7b2d0c5d11106d6deb2a21c3c067afc967de8ce5a32df16e868614a16157e1c7bb996c2a708fba668b898f6e7738727a938c048b480ec52c47e87a85bc42
-
SSDEEP
12288:5S2RMdHEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:w2RMdkAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
Files
-
b707c7b025d1e3fdc38245d877930e2c4d080dac6928f33bf265f6dd79fa9242.exe windows x86
0ebdd91e07ba661da6dd3b03db9e68c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventW
GetCurrentThreadId
GetCurrentProcessId
LocalFree
LoadLibraryW
GetDriveTypeA
InitializeCriticalSection
lstrlenW
WriteFile
GetPrivateProfileStringA
ReleaseMutex
TlsGetValue
IsBadStringPtrW
HeapCreate
GetEnvironmentVariableW
GlobalFlags
ReleaseMutex
GetFileTime
FindAtomA
FindClose
user32
GetSysColor
CallWindowProcW
GetKeyboardType
DrawStateW
GetClassInfoA
CreateWindowExA
EndDialog
DrawTextA
GetSysColor
GetClientRect
IsWindow
SetFocus
DispatchMessageA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ