Static task
static1
Behavioral task
behavioral1
Sample
b18a49c9da058a3080d107f88c2026b185fc3fdc93ebd4f7d60cabefff758727.exe
Resource
win7-20221111-en
General
-
Target
b18a49c9da058a3080d107f88c2026b185fc3fdc93ebd4f7d60cabefff758727
-
Size
111KB
-
MD5
1ce11fe0fd41ab717736babcf83090cc
-
SHA1
e57523628ce6d5c4283af03412b55d6377b9b9a2
-
SHA256
b18a49c9da058a3080d107f88c2026b185fc3fdc93ebd4f7d60cabefff758727
-
SHA512
2d6e66e233e0deeec8d580c63a522d7c4a5981d15514b30f3c266410c88fa508f6248743a4268deedf3692a27e42f99d8c8be3777ec9310c0b1c3748b48b8861
-
SSDEEP
3072:y5eM/Am1E9iO7nZrPHXkM1QzlpGvkH92q3/tny:b9NBPHUhz7G8Hh/c
Malware Config
Signatures
Files
-
b18a49c9da058a3080d107f88c2026b185fc3fdc93ebd4f7d60cabefff758727.exe windows x86
5c41c13ea8ecaa1a316cd321f232ad87
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CreateDirectoryW
lstrlenA
GetModuleHandleA
RemoveDirectoryA
HeapFree
GetFileType
ReleaseSemaphore
CreateEventW
CreateFileA
SetStdHandle
ReleaseMutex
FindClose
WriteConsoleW
RemoveDirectoryA
VirtualProtect
GetTickCount
GetCommandLineA
DeleteFileA
FindClose
OpenEventA
Beep
CreateFileMappingW
GetDriveTypeA
ResetEvent
user32
DestroyMenu
DispatchMessageA
IsZoomed
IsWindow
GetWindowLongA
CreateIcon
GetSysColor
DestroyMenu
FindWindowA
GetClassInfoA
DrawTextW
MessageBoxA
PeekMessageA
dmloader
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ