Static task
static1
Behavioral task
behavioral1
Sample
68d34fef452017cac780b4b058cd22267fb4469a8c00b41a593a43975cdf6b7a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
68d34fef452017cac780b4b058cd22267fb4469a8c00b41a593a43975cdf6b7a.exe
Resource
win10v2004-20221111-en
General
-
Target
68d34fef452017cac780b4b058cd22267fb4469a8c00b41a593a43975cdf6b7a
-
Size
304KB
-
MD5
02887f842b194d4e37d77072c7d4bfc5
-
SHA1
dffcfbfb455328f3e2056e0974d99fde0b81abe1
-
SHA256
68d34fef452017cac780b4b058cd22267fb4469a8c00b41a593a43975cdf6b7a
-
SHA512
833f5197f7d63a25da8067d52318bcd17de8f16721ab0bb070c71295653088ea139b13206c4414f66e04480e5fc6418a57fa4b6758ed3182e971d2a6c9f7c1f7
-
SSDEEP
6144:G7ZoCevPrP+lhwYzBzhiE1WGjgyadJlKBBtO5VtVMoMCYWF/:GVevD2YCzhX1PjKdcBtKtVM3
Malware Config
Signatures
Files
-
68d34fef452017cac780b4b058cd22267fb4469a8c00b41a593a43975cdf6b7a.exe windows x86
25d2df88c2fa986edd4b567e1153c1a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
ResetEvent
LocalSize
ReleaseMutex
GetLocalTime
CloseHandle
GetExitCodeProcess
GetPrivateProfileIntW
FreeConsole
FindVolumeClose
CreateThread
GetProcessHeap
LocalFree
GetDriveTypeA
GetMailslotInfo
lstrlenA
GetModuleHandleW
CreateFileW
ReadFile
GlobalFree
user32
CallWindowProcA
GetKeyState
EndDialog
GetSysColor
GetMenu
GetClassInfoA
SetFocus
DispatchMessageA
CreateWindowExA
GetCursorInfo
GetDlgItem
GetClientRect
DrawStateW
clbcatq
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
ComPlusMigrate
desk.cpl
InstallScreenSaverA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ