Static task
static1
Behavioral task
behavioral1
Sample
89ecc67b0ee02e99d4b5de9eacb0ac0b1319a8155f074c00f65d44b4f6e7bcd9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89ecc67b0ee02e99d4b5de9eacb0ac0b1319a8155f074c00f65d44b4f6e7bcd9.exe
Resource
win10v2004-20220901-en
General
-
Target
89ecc67b0ee02e99d4b5de9eacb0ac0b1319a8155f074c00f65d44b4f6e7bcd9
-
Size
304KB
-
MD5
135138a8d501f9b7e20880fb918e1295
-
SHA1
403d68abf11718152079330056f2d5010ac4c7cc
-
SHA256
89ecc67b0ee02e99d4b5de9eacb0ac0b1319a8155f074c00f65d44b4f6e7bcd9
-
SHA512
f5fcf6c169ca3b080d231d763d506cb5993c598262f3485d171ce7385dea3b6dce37e54d2c705761be01bd4ac0a9feb3b04b04be3f154f9307dff13572baef1d
-
SSDEEP
6144:uXsqh0KaGZ8QvzNnSCizQpj9W04okPThMXr8JvHlC4Vx8llOfGGKBQbpB:o5NNnSCkQpg0tkPT2XoJvHl7xeGKuB
Malware Config
Signatures
Files
-
89ecc67b0ee02e99d4b5de9eacb0ac0b1319a8155f074c00f65d44b4f6e7bcd9.exe windows x86
43475b0e9e5f5e4321c3130b9e679a07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindVolumeClose
GetExitCodeProcess
SetEvent
ReadFile
CloseHandle
GetPrivateProfileIntW
CreateFileW
GetModuleHandleW
GlobalSize
GetDriveTypeA
ReleaseMutex
GetLocalTime
lstrlenA
VirtualAlloc
GetComputerNameW
ExitThread
GetTickCount
FreeConsole
GlobalFree
LocalFree
user32
CallWindowProcA
GetClassInfoA
GetKeyState
GetMenu
SetFocus
CreateWindowExA
EndDialog
GetCursorInfo
GetClientRect
DrawStateW
GetSysColor
DispatchMessageA
GetDlgItem
clbcatq
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ