Static task
static1
Behavioral task
behavioral1
Sample
5b710446bbcee0f18dcea0b1a319cd40e170b1721c52230e18bd8ab9b12df060.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5b710446bbcee0f18dcea0b1a319cd40e170b1721c52230e18bd8ab9b12df060.exe
Resource
win10v2004-20221111-en
General
-
Target
5b710446bbcee0f18dcea0b1a319cd40e170b1721c52230e18bd8ab9b12df060
-
Size
292KB
-
MD5
5c809edd6c3150e3fde7b17613bdc768
-
SHA1
2967283f7d75f20af193303d4c048497b237b14d
-
SHA256
5b710446bbcee0f18dcea0b1a319cd40e170b1721c52230e18bd8ab9b12df060
-
SHA512
a64b1aa4b7cf09fa4939d3750d00d2647e3d3335a7d5dfda2a25cab7ca12d0a4ca87f631e8c323060c8acba4170a03fb2308d7131829febd0be6d332701edd85
-
SSDEEP
6144:FRCbFSxCJEN2a6kQ7aQq4xc8ZrIlSRdgGZj5exE/wPJb:rCbFSIjkQ/qX8rIlkdgCsaoPN
Malware Config
Signatures
Files
-
5b710446bbcee0f18dcea0b1a319cd40e170b1721c52230e18bd8ab9b12df060.exe windows x86
0050ba9aaa587cec3372e42c8e13b9fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetModuleFileNameA
GetDriveTypeW
GetCurrentThreadId
GetConsoleAliasW
SetEvent
SetLastError
HeapCreate
FindClose
ReadFile
EnterCriticalSection
FindAtomW
CreateMailslotA
GetPrivateProfileStringW
LocalFree
GetModuleHandleA
EnumCalendarInfoW
GetCurrentProcessId
GlobalFree
SuspendThread
user32
SetFocus
GetCursorInfo
GetKeyState
GetKeyboardType
DrawTextW
DispatchMessageA
GetMenuInfo
IsWindow
GetClassInfoA
GetSysColor
GetClientRect
DispatchMessageA
CallWindowProcW
avicap32
videoThunk32
videoThunk32
videoThunk32
videoThunk32
videoThunk32
desk.cpl
DeskSetCurrentScheme
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 733KB - Virtual size: 761KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
utejmpf Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE