Static task
static1
Behavioral task
behavioral1
Sample
7480bfc240d9b17d29e68a608b17cab1178ae2afdcd311982afff02aa8fb4191.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7480bfc240d9b17d29e68a608b17cab1178ae2afdcd311982afff02aa8fb4191.exe
Resource
win10v2004-20220812-en
General
-
Target
7480bfc240d9b17d29e68a608b17cab1178ae2afdcd311982afff02aa8fb4191
-
Size
753KB
-
MD5
6691fdcafd6cc3ec9a61e7b660b60ff6
-
SHA1
305d25150dbeed368c12a7c32beab621523664c1
-
SHA256
7480bfc240d9b17d29e68a608b17cab1178ae2afdcd311982afff02aa8fb4191
-
SHA512
359b45ea2c6ac705d6a15aaf428aa40bb5f0cc4ae18c5006948eb55806f5433ab9eda2ba3788ee79e4bc6f3fddbe3f07d28c4e9783fc5135f76b3326358b7761
-
SSDEEP
12288:v0zzAkWvi4Vz60XFi/CPualX2gTl1zoQxysi9c7iXLXt+KrspJ6wTojir:v0/AZ9BXF1Ph3TlOQjHKt+iuJdW
Malware Config
Signatures
Files
-
7480bfc240d9b17d29e68a608b17cab1178ae2afdcd311982afff02aa8fb4191.exe windows x86
a77b25f29002d6d3f7b20f8480389149
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetCommandLineW
SuspendThread
DeleteFileA
FindResourceExA
GetTickCount
OpenThread
SetEvent
HeapCreate
GetStartupInfoA
GetEnvironmentVariableW
ExitProcess
WriteConsoleA
GetFileAttributesA
FindClose
HeapDestroy
ReleaseMutex
OpenEventW
CloseHandle
CloseHandle
user32
FindWindowA
IsZoomed
GetClassInfoA
PeekMessageA
DispatchMessageA
GetSysColor
GetWindowLongA
DrawTextW
DispatchMessageA
GetKeyState
CreateIcon
SetFocus
CallWindowProcW
docprop
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ