Static task
static1
Behavioral task
behavioral1
Sample
875d6a8888a3bff48425e197c289882dbb4f8239294efa8154c29b7ebf67281a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
875d6a8888a3bff48425e197c289882dbb4f8239294efa8154c29b7ebf67281a.exe
Resource
win10v2004-20221111-en
General
-
Target
875d6a8888a3bff48425e197c289882dbb4f8239294efa8154c29b7ebf67281a
-
Size
53KB
-
MD5
ff6ded01099bf938c2b5c2229987a4d3
-
SHA1
7ebc45671d1b4f6953874d3cbf40163b6e2795d0
-
SHA256
875d6a8888a3bff48425e197c289882dbb4f8239294efa8154c29b7ebf67281a
-
SHA512
558231fb78d2b276979725a6c8cbe9b5d365dc7e44692fdc68e93e2a0dcf21c01f3a8995bf354b49dd1d17b88360da4461e81af0ec05bc70be2f1d61cff398fb
-
SSDEEP
768:yKyCp3EIPG1IlLOXgYD6mzXzyYaVfzMN6magGgN1JNsxPjXGwLoz+qBPmRkRH:du1IcXgIPzyYaVJ7dgbJN2jG+UPm6J
Malware Config
Signatures
Files
-
875d6a8888a3bff48425e197c289882dbb4f8239294efa8154c29b7ebf67281a.exe windows x86
95f6034059b9a86fa86d3f03159fe5fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
CreateEventA
CloseHandle
GetModuleHandleA
ResetEvent
HeapDestroy
VirtualQuery
HeapCreate
GetVolumePathNameA
GetCommandLineA
GetTimeFormatA
Sleep
FindResourceW
DeleteFileW
CancelIo
TlsGetValue
GetEnvironmentVariableA
GetCommandLineA
lstrlenA
CloseHandle
user32
GetClassInfoA
CreateIcon
GetWindowLongA
IsZoomed
CallWindowProcA
DispatchMessageA
DrawTextW
FindWindowA
GetSysColor
DispatchMessageA
DestroyMenu
IsWindow
PeekMessageA
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE