Static task
static1
Behavioral task
behavioral1
Sample
b1d3567b4f21a43fa5c56f84525b9e5f222a3d2a5af77dd624a096a1dac73550.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b1d3567b4f21a43fa5c56f84525b9e5f222a3d2a5af77dd624a096a1dac73550.exe
Resource
win10v2004-20221111-en
General
-
Target
b1d3567b4f21a43fa5c56f84525b9e5f222a3d2a5af77dd624a096a1dac73550
-
Size
140KB
-
MD5
2de4455cfa2126bf0ac5f848c3a92ed7
-
SHA1
5a8faa34d8ca9edcfcafddd9b263804cdf324b7b
-
SHA256
b1d3567b4f21a43fa5c56f84525b9e5f222a3d2a5af77dd624a096a1dac73550
-
SHA512
841ae00b8801af68bffec43bcbe2b6e30f9fc7cfcde4c7f5bfe9ede1f199d969ff66337c3bbfa4c1e29513b251041f634736035307f5a788d1402e3775a7ac75
-
SSDEEP
3072:YLCo+VYYWeiZwBuqMsm3ONrE0kANhX0yI:To+6YW/ZKPMd3sEsD0y
Malware Config
Signatures
Files
-
b1d3567b4f21a43fa5c56f84525b9e5f222a3d2a5af77dd624a096a1dac73550.exe windows x86
69d3d0a2b864eff2c9a05213a571a3c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
OpenEventA
CreateFileA
ExitProcess
GetFileAttributesA
HeapAlloc
GetProcessHeap
HeapReAlloc
CloseHandle
lstrlenA
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemDirectoryA
SetCurrentDirectoryA
WritePrivateProfileStringA
GetFullPathNameA
HeapFree
user32
wvsprintfA
advapi32
CloseServiceHandle
StartServiceA
CreateServiceA
OpenSCManagerA
shell32
DragAcceptFiles
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE