Static task
static1
Behavioral task
behavioral1
Sample
57f46651ee57a021d1bddf89abc2cca8bd1779c154f27a912d04f9d47e65893e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
57f46651ee57a021d1bddf89abc2cca8bd1779c154f27a912d04f9d47e65893e.exe
Resource
win10v2004-20220812-en
General
-
Target
57f46651ee57a021d1bddf89abc2cca8bd1779c154f27a912d04f9d47e65893e
-
Size
53KB
-
MD5
3b3cbe2d2bc302f838ba658683b91a10
-
SHA1
de6c0b21d2958ed07108fa5c6cb68c5bc91efe6c
-
SHA256
57f46651ee57a021d1bddf89abc2cca8bd1779c154f27a912d04f9d47e65893e
-
SHA512
3e135103ac8303cb318a810faeec939c1d65058b3a4ceb81b4d5c70544a1a5502525e03060099b9fa2f309fce2013140d8ce90adb86d4ab7e14279ab90736219
-
SSDEEP
768:3vaJGKILnxb6Gi8HAs4L9gN01mEH2zuZvq4wRvjsgQg2/HfMmu9nUinxRl9SLnRl:/B1Fi8gs4R0KvwJQnvUTTMaO8gmj
Malware Config
Signatures
Files
-
57f46651ee57a021d1bddf89abc2cca8bd1779c154f27a912d04f9d47e65893e.exe windows x86
7e7462160b9fe5e33d8b794b1642643b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
SetLastError
GetLogicalDriveStringsW
CreateNamedPipeW
Sleep
GetModuleFileNameA
GetCommState
lstrcmpiW
DeleteFileA
GetProcessHeap
HeapCreate
lstrcmpiW
lstrcmpiW
GetModuleHandleA
lstrlenA
lstrcmpiW
lstrcmpiW
GetConsoleAliasW
GetVolumePathNameW
GetStartupInfoA
IsValidLocale
CreateMailslotW
FileTimeToLocalFileTime
sqlunirl
wsprintf_
_CallMsgFilter_@8
_AppendMenu_@16
AbortSystemShutdown_
Sections
.text Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.RDATA Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ORPC Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PDATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ