Static task
static1
Behavioral task
behavioral1
Sample
676c67669a330c28f05c548ec92ff73dd736791be0cf243f2bee8b47cba079e7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
676c67669a330c28f05c548ec92ff73dd736791be0cf243f2bee8b47cba079e7.exe
Resource
win10v2004-20220812-en
General
-
Target
676c67669a330c28f05c548ec92ff73dd736791be0cf243f2bee8b47cba079e7
-
Size
370KB
-
MD5
87a82f7e8d8698500ac712c13bc27fb4
-
SHA1
0cffa030f818b02b29631812fb75baef2aeedc18
-
SHA256
676c67669a330c28f05c548ec92ff73dd736791be0cf243f2bee8b47cba079e7
-
SHA512
2cf6b51b0ee552517161938ce41d651306b2164da9035e5fc35d4847629a3dc4aea6af3f01c1af532dd114790e4fb188beeeb9229a7caaf9521f0644da9c8072
-
SSDEEP
6144:hmCym1aZCkx2o4sGmn8rv4DNpTaQzRmPQ8QiG8AKMEvxkNGkfnCJ49ijMXC:cCyFqon8rvgp49VMEZMfna49ijM
Malware Config
Signatures
Files
-
676c67669a330c28f05c548ec92ff73dd736791be0cf243f2bee8b47cba079e7.exe windows x86
b42b0dfc4d6db015e84bec1c9fe9ab17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetExitCodeProcess
GetPrivateProfileIntW
lstrlenA
GetProcessHeap
GetDriveTypeA
GetModuleHandleW
LocalSize
CloseHandle
CreateFileW
GetMailslotInfo
VirtualAlloc
FreeConsole
FindVolumeClose
CreateThread
ReleaseMutex
GetLocalTime
ResetEvent
LocalFree
GlobalFree
user32
GetClassInfoA
DrawStateW
SetFocus
CallWindowProcA
DispatchMessageA
GetSysColor
CreateWindowExA
GetDlgItem
GetMenu
GetKeyState
EndDialog
GetClientRect
GetCursorInfo
clbcatq
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
ComPlusMigrate
ComPlusMigrate
desk.cpl
InstallScreenSaverA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ