Static task
static1
Behavioral task
behavioral1
Sample
8617465db6a562081f34abea86169233a259d5a0052109a3bfef961a4e98d164.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8617465db6a562081f34abea86169233a259d5a0052109a3bfef961a4e98d164.exe
Resource
win10v2004-20220812-en
General
-
Target
8617465db6a562081f34abea86169233a259d5a0052109a3bfef961a4e98d164
-
Size
767KB
-
MD5
7542eaef4116e5671e9cda08a49df64b
-
SHA1
75e6a80a6fe43a9af3e52a454210c1632c272ddc
-
SHA256
8617465db6a562081f34abea86169233a259d5a0052109a3bfef961a4e98d164
-
SHA512
bb92b6b799a4676460ec9ddc1828f265f11987a37c8f0ae0379caccf764238427e8b83f650ad61f4484c30c628e197fdeb09d04d6a8537fadcd75f94cd728995
-
SSDEEP
12288:YdhxFd0dgNIiRgFD7UkO64Fd5cYrXvVESrzctIcKvS+1iUKZn9sYkqYXOJ:Ydh6lE6G6gvDzctTn79eqE
Malware Config
Signatures
Files
-
8617465db6a562081f34abea86169233a259d5a0052109a3bfef961a4e98d164.exe windows x86
51a5420dd988e884cb6d474f6774d5f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtectEx
ReleaseMutex
CreateFileMappingW
HeapDestroy
WriteConsoleW
CreateFileA
DeleteFileA
GetStartupInfoA
LoadLibraryA
GetVersion
SetLastError
ReleaseSemaphore
RemoveDirectoryW
RemoveDirectoryW
CreatePipe
Sleep
OpenEventW
CreateMutexA
GetStdHandle
GetFileSize
HeapSize
lstrlenA
GetCommandLineW
CreateDirectoryW
SetLastError
user32
IsWindow
CreateIcon
MessageBoxA
GetSysColor
DispatchMessageA
DrawTextW
IsZoomed
DestroyMenu
DestroyMenu
FindWindowA
GetClassInfoA
PeekMessageA
GetWindowLongA
feclient
FeClientInitialize
FeClientInitialize
FeClientInitialize
FeClientInitialize
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 760KB - Virtual size: 760KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE