Static task
static1
Behavioral task
behavioral1
Sample
91105359ae8924658d13f8f6c07cea166127936aa87ab45008cbbb6770170a8e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
91105359ae8924658d13f8f6c07cea166127936aa87ab45008cbbb6770170a8e.exe
Resource
win10v2004-20221111-en
General
-
Target
91105359ae8924658d13f8f6c07cea166127936aa87ab45008cbbb6770170a8e
-
Size
809KB
-
MD5
d41afcc632c6ec9f4704abee22ede7cb
-
SHA1
17d5629c1d8a32817e23cf690f38ecc2d6343e03
-
SHA256
91105359ae8924658d13f8f6c07cea166127936aa87ab45008cbbb6770170a8e
-
SHA512
de55038c7c2ead46f8ee29b1c4664cad122310406f56402db5dbd1f27b9cf2b6637e629b0c5c590e0b53fa4c90d1e1be027460ddc1dfdd9b483fdd9dab6da156
-
SSDEEP
12288:WUFSTTwCrYbsfV2OYMQPXbIAiPSwJZaJ0eOP7uG/peZbHTqtEZrVi92cP+A7G:WUFCtQO7fAi6wJlFPSG/p4/r6RP
Malware Config
Signatures
Files
-
91105359ae8924658d13f8f6c07cea166127936aa87ab45008cbbb6770170a8e.exe windows x86
8e92216a8b6c17ad303a37a45b196f81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntW
GlobalSize
ReadFile
GetFileAttributesW
GetDriveTypeA
GetTickCount
CloseHandle
VirtualAlloc
GetLocalTime
LocalFree
lstrlenA
GetExitCodeProcess
GetModuleHandleW
FindVolumeClose
ExitThread
FreeConsole
CreateFileA
GetComputerNameW
GlobalFree
FindAtomW
user32
FillRect
DispatchMessageA
GetCaretPos
GetMenu
DestroyCaret
GetDlgItem
CreateWindowExA
DrawStateA
CloseWindow
CallWindowProcA
EndDialog
GetClassInfoA
GetClientRect
clbcatq
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
msexch40
DllUnregisterServer
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 800KB - Virtual size: 799KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ