Static task
static1
Behavioral task
behavioral1
Sample
2485486b68595bff6c8919f4dffdce352024577ee7c8d8d0e0674bc15bb08dad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2485486b68595bff6c8919f4dffdce352024577ee7c8d8d0e0674bc15bb08dad.exe
Resource
win10v2004-20220812-en
General
-
Target
2485486b68595bff6c8919f4dffdce352024577ee7c8d8d0e0674bc15bb08dad
-
Size
498KB
-
MD5
793264c14ec1342df515dc1c9b988ebd
-
SHA1
27176413fd3f63a4986184b401319bcd58675b01
-
SHA256
2485486b68595bff6c8919f4dffdce352024577ee7c8d8d0e0674bc15bb08dad
-
SHA512
e83cc9f9a5badb01f899d3b625911fb00a58f05cf591e9bb4d43558c7ebcfec53d5a5fd9b636a95eb2339657c7a0f005c0777acda570f054d6a6df297e8b6ffc
-
SSDEEP
6144:FhKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDk+f:FhqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
2485486b68595bff6c8919f4dffdce352024577ee7c8d8d0e0674bc15bb08dad.exe windows x86
c6c6a45f256e5dbdca752445de675268
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
DeleteFileA
IsBadStringPtrW
CloseHandle
ReleaseMutex
CreateFileA
CloseHandle
HeapCreate
CreateFileMappingW
Sleep
GetStartupInfoA
HeapDestroy
DeviceIoControl
GetModuleHandleA
GetModuleFileNameW
GetDriveTypeA
GetCommandLineA
TlsAlloc
IsDebuggerPresent
PulseEvent
user32
IsZoomed
IsWindow
FindWindowW
DestroyMenu
DispatchMessageA
LoadImageA
DispatchMessageA
DestroyWindow
GetWindowLongA
DrawTextW
PeekMessageA
CallWindowProcW
GetIconInfo
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ