Static task
static1
Behavioral task
behavioral1
Sample
678a0f97c18ed2529c33df835a962fd2a636b1ef770b8b15b2fbc5357cba02ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
678a0f97c18ed2529c33df835a962fd2a636b1ef770b8b15b2fbc5357cba02ad.exe
Resource
win10v2004-20220901-en
General
-
Target
678a0f97c18ed2529c33df835a962fd2a636b1ef770b8b15b2fbc5357cba02ad
-
Size
156KB
-
MD5
7fa9a86ea5c96e021e7dd048e71c5afc
-
SHA1
9b44abcd56927e2786b59dfb1dfdfcdb0bb8f0be
-
SHA256
678a0f97c18ed2529c33df835a962fd2a636b1ef770b8b15b2fbc5357cba02ad
-
SHA512
8649472104d0b19dc84665d70c050d57fc37c33ad3358563ea2bbb4c9a44736aa00e2519f80bd764a78d0f772ce12a9b73e45449af2044b3bb4a824ab09f8e81
-
SSDEEP
3072:W8mrhpqEdsVnd2SVxOKuEwEBwJsxfafg+g:W8mVpxCdd2SgDa0g/
Malware Config
Signatures
Files
-
678a0f97c18ed2529c33df835a962fd2a636b1ef770b8b15b2fbc5357cba02ad.exe windows x86
fdfb975e86d7dc9ecfde5204b830e916
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
SetLastError
GetStartupInfoA
GetModuleFileNameA
GetFileAttributesW
SetEvent
TlsGetValue
TlsAlloc
ReleaseMutex
CreateFileA
lstrlenA
GetStdHandle
GetCommandLineW
HeapDestroy
GetEnvironmentVariableA
IsBadCodePtr
ResetEvent
GetACP
CreateFileMappingA
HeapCreate
user32
GetWindowLongA
DestroyMenu
PeekMessageA
CallWindowProcW
IsZoomed
DrawTextW
FindWindowA
IsWindow
DispatchMessageA
CreateIcon
GetClassInfoA
DispatchMessageA
GetSysColor
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 147KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE