Static task
static1
Behavioral task
behavioral1
Sample
ac5fc499aef3925b24534b00030249c198788de292dc2a88d4f984544480b9f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac5fc499aef3925b24534b00030249c198788de292dc2a88d4f984544480b9f4.exe
Resource
win10v2004-20221111-en
General
-
Target
ac5fc499aef3925b24534b00030249c198788de292dc2a88d4f984544480b9f4
-
Size
870KB
-
MD5
b1ea6e717c0913be91a785b7212418ef
-
SHA1
3baf41ebe4bd83203722988d69dcbee91b7ee26e
-
SHA256
ac5fc499aef3925b24534b00030249c198788de292dc2a88d4f984544480b9f4
-
SHA512
0492071ca7aeee06d3a861421d7c50431251d3c86be0b3c934d48f1b133c1af407e33fd6e0a122dc06c52a465f4c4430d3d34b0672806f51c59e4303c1398b46
-
SSDEEP
12288:bzZlImtoD/82bmjvWAbdWTviCW3WKMurIIdEzGGFkiIzblUXs4:bzZlIn82CvZf3WKM1MEzRFLIzblU
Malware Config
Signatures
Files
-
ac5fc499aef3925b24534b00030249c198788de292dc2a88d4f984544480b9f4.exe windows x86
edde611b95fbe431de4813da3f3b571f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
CloseHandle
CreateFileMappingW
IsDebuggerPresent
CreateFileA
GetStartupInfoA
IsBadStringPtrW
DeleteFileA
CloseHandle
HeapDestroy
ReleaseMutex
HeapCreate
DeviceIoControl
Sleep
GetModuleFileNameW
lstrlenA
TlsAlloc
PulseEvent
GetCommandLineA
GetDriveTypeA
user32
CallWindowProcW
DispatchMessageA
GetWindowLongA
IsWindow
DrawTextW
DestroyWindow
LoadImageA
DispatchMessageA
IsZoomed
FindWindowW
GetIconInfo
PeekMessageA
DestroyMenu
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ