Static task
static1
Behavioral task
behavioral1
Sample
695fbb0d55e087ac911d678955b4871fc223c73ba9bd89a8b2878b6c3eb7a42b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
695fbb0d55e087ac911d678955b4871fc223c73ba9bd89a8b2878b6c3eb7a42b.exe
Resource
win10v2004-20220812-en
General
-
Target
695fbb0d55e087ac911d678955b4871fc223c73ba9bd89a8b2878b6c3eb7a42b
-
Size
204KB
-
MD5
a847a340b43b1779497c241191c279d7
-
SHA1
942242590e0665d4a38a041e80d685d4395129fe
-
SHA256
695fbb0d55e087ac911d678955b4871fc223c73ba9bd89a8b2878b6c3eb7a42b
-
SHA512
c6a8c41181286983f7dc60ad8b6229ff52ab2993bd39e7b8a3fccf560464a64dc61c535432db353f98995bbf2dcda748a507d7854cdf6ce2458f096f71c8a92b
-
SSDEEP
3072:sKYS0LDv//+CgEq71p67X+trTQpJ9z8rBoxFUjTppO03kuSB:srPvn+CLrDpJuFqGO03k
Malware Config
Signatures
Files
-
695fbb0d55e087ac911d678955b4871fc223c73ba9bd89a8b2878b6c3eb7a42b.exe windows x86
c5594cb13f73954c1b78f0ceb1dbe3c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleA
GetCalendarInfoA
GetEnvironmentVariableA
VirtualAlloc
FatalExit
GetFileAttributesExA
GetCurrentDirectoryA
SetFilePointerEx
GetThreadContext
ReadConsoleInputA
HeapSize
EndUpdateResourceA
SetProcessWorkingSetSize
GetProfileSectionA
UpdateResourceA
HeapFree
GetFileAttributesA
EnumResourceTypesA
GetSystemWindowsDirectoryA
FileTimeToDosDateTime
ResumeThread
GetDefaultCommConfigA
WriteConsoleOutputCharacterW
IsBadStringPtrA
UnregisterWaitEx
UnlockFileEx
RegisterWaitForSingleObjectEx
SuspendThread
SetCommTimeouts
WaitForMultipleObjects
GetStringTypeExA
ConnectNamedPipe
Module32First
WritePrivateProfileSectionA
GetConsoleMode
user32
GetClassInfoA
SetActiveWindow
InvertRect
IsCharLowerA
EnumDisplaySettingsExA
SetCursorContents
IsCharLowerA
InflateRect
SystemParametersInfoA
DispatchMessageA
CopyAcceleratorTableA
CreateWindowExA
TranslateAcceleratorA
CountClipboardFormats
MapWindowPoints
SetClipboardViewer
GetUserObjectInformationA
GetReasonTitleFromReasonCode
DefMDIChildProcA
DestroyReasons
ShowOwnedPopups
CountClipboardFormats
CloseDesktop
AlignRects
DlgDirSelectExA
CallMsgFilterA
CharUpperBuffA
DestroyWindow
GetInputState
UnhookWindowsHook
GetMenuItemID
advapi32
CredDeleteA
opengl32
glPolygonOffset
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ