Static task
static1
Behavioral task
behavioral1
Sample
ad9b4da2ff71a491076b8ef2fa3d3d3b1aa047449a2c71c3d61545710091cfc0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad9b4da2ff71a491076b8ef2fa3d3d3b1aa047449a2c71c3d61545710091cfc0.exe
Resource
win10v2004-20220812-en
General
-
Target
ad9b4da2ff71a491076b8ef2fa3d3d3b1aa047449a2c71c3d61545710091cfc0
-
Size
372KB
-
MD5
23c588dec8856c6add6c1745e47788fc
-
SHA1
e4c17c1df452c9c28bf08c0f2530800e48c1c50f
-
SHA256
ad9b4da2ff71a491076b8ef2fa3d3d3b1aa047449a2c71c3d61545710091cfc0
-
SHA512
fbf97b323a6f22b3b0a11743fb61713b9b8002a084b8705adaaffa9f410263c457b7c9e7cf8b4ae155cb3deee9cea9bcc31357cdf0a62cdac073af01e334677f
-
SSDEEP
6144:nsGDRZreLaw8nmQWueyVgt/HcF06LiXShLfwys10lpzhhclNxyvM:nsGDneF8m4ewS/HcF+ih7wp10l1h+Txd
Malware Config
Signatures
Files
-
ad9b4da2ff71a491076b8ef2fa3d3d3b1aa047449a2c71c3d61545710091cfc0.exe windows x86
f3073306eeb7c7d0851b4b2ebc815994
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
GetLocalTime
GetPrivateProfileIntW
GetTickCount
SetEvent
GlobalSize
GetComputerNameW
FindVolumeClose
LocalFree
CloseHandle
CreateFileW
FreeConsole
ReleaseMutex
ExitThread
GetDriveTypeA
GlobalFree
lstrlenA
ReadFile
GetExitCodeProcess
GetModuleHandleW
user32
DispatchMessageA
GetCursorInfo
DrawStateW
GetSysColor
EndDialog
GetClientRect
GetDlgItem
GetClassInfoA
GetMenu
GetKeyState
CreateWindowExA
CallWindowProcA
GetCaretPos
clbcatq
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
ComPlusMigrate
ComPlusMigrate
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ