Static task
static1
Behavioral task
behavioral1
Sample
1539ee8a171d3096eab16270e2716cdd5201dbb9c2182b9da2a153421bcffcaf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1539ee8a171d3096eab16270e2716cdd5201dbb9c2182b9da2a153421bcffcaf.exe
Resource
win10v2004-20221111-en
General
-
Target
1539ee8a171d3096eab16270e2716cdd5201dbb9c2182b9da2a153421bcffcaf
-
Size
370KB
-
MD5
4bc5cb8566b84d59167f9cfb0131914c
-
SHA1
70e4cea4f7cbe2004e410def19f1d2e57e054762
-
SHA256
1539ee8a171d3096eab16270e2716cdd5201dbb9c2182b9da2a153421bcffcaf
-
SHA512
7a33577014cd9fdd81c57bc887aecc5997178cb67cce5fed45beae4f4e016dca90dacbecce341f227e0fc1099bcc7698c71ccb00985d68958cd43e53de67e6e4
-
SSDEEP
6144:A4m1aZCkx2o4sGmn8rv4DNpTaQzRmPQ8QiG8AKMEvxkNGkfnCJ49ijMXC:lFqon8rvgp49VMEZMfna49ijM
Malware Config
Signatures
Files
-
1539ee8a171d3096eab16270e2716cdd5201dbb9c2182b9da2a153421bcffcaf.exe windows x86
0559144f008334d8dd970bc30e720094
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
ReleaseMutex
FreeConsole
ReadFile
LocalSize
CreateThread
GetModuleHandleW
GetExitCodeProcess
VirtualAlloc
GetMailslotInfo
lstrlenA
LocalFree
GlobalFree
GetPrivateProfileIntW
ResetEvent
FindVolumeClose
GetDriveTypeW
CloseHandle
InterlockedExchange
GetProcessHeap
user32
CreateWindowExA
IsIconic
GetMenu
GetClientRect
CallWindowProcW
EndDialog
DispatchMessageA
GetDlgItem
GetClassInfoA
SetFocus
GetCursorInfo
DrawStateW
GetSysColor
dsprop
CheckADsError
CheckADsError
CheckADsError
ReportError
CheckADsError
desk.cpl
InstallScreenSaverW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ