Static task
static1
Behavioral task
behavioral1
Sample
797c4d09071602de883af4204fce2807d582f0a84037a6efa9d47be09eff64bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
797c4d09071602de883af4204fce2807d582f0a84037a6efa9d47be09eff64bc.exe
Resource
win10v2004-20220812-en
General
-
Target
797c4d09071602de883af4204fce2807d582f0a84037a6efa9d47be09eff64bc
-
Size
822KB
-
MD5
615990f623235b7177f9b1576ae4328e
-
SHA1
4d27119f7671edf2145f1e9d553ee94840f6c5ef
-
SHA256
797c4d09071602de883af4204fce2807d582f0a84037a6efa9d47be09eff64bc
-
SHA512
8967e13080b99135d8f04995afc2eaca93f4d1bb6c7f882a2201a2bf3b62f9ef928cc75eabd25f1ff4f6663f92f7b3ffc5d27298bba273f71f475656291eeb50
-
SSDEEP
24576:So25A5RbXkbHlW11ljT2nfYswQB7LLnfgfm+94:SonjUETljk6QB73femc
Malware Config
Signatures
Files
-
797c4d09071602de883af4204fce2807d582f0a84037a6efa9d47be09eff64bc.exe windows x86
10a08014315724555aaaa77ec96d8f5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
GlobalFree
WriteFile
ResumeThread
FindVolumeClose
CreateEventA
GetCommandLineA
VirtualAlloc
GetACP
lstrlenA
GetEnvironmentVariableA
ResetEvent
GlobalSize
CreateMutexA
CloseHandle
GetModuleHandleW
InterlockedExchange
LocalFree
GetDriveTypeW
GetPrivateProfileIntW
user32
EndDialog
DrawStateW
DispatchMessageA
GetClassInfoA
GetCursorInfo
IsWindow
SetFocus
GetClientRect
GetSysColor
CreateWindowExA
GetKeyboardType
GetSysColor
CallWindowProcW
avicap32
videoThunk32
AppCleanup
videoThunk32
videoThunk32
videoThunk32
sysdm.cpl
NoExecuteAddFileOptOutList
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 812KB - Virtual size: 812KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ