Static task
static1
Behavioral task
behavioral1
Sample
423b8d480623bffba257ef686f8063ce1d1a3db44334f2125fd3f5db0c77d894.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
423b8d480623bffba257ef686f8063ce1d1a3db44334f2125fd3f5db0c77d894.exe
Resource
win10v2004-20221111-en
General
-
Target
423b8d480623bffba257ef686f8063ce1d1a3db44334f2125fd3f5db0c77d894
-
Size
80KB
-
MD5
506215c5a96cd8f926ed0b329267c391
-
SHA1
009a39aa41c2429df9ae4a96f6677723923587c9
-
SHA256
423b8d480623bffba257ef686f8063ce1d1a3db44334f2125fd3f5db0c77d894
-
SHA512
4b19eed1a427e6a9f425bb1c24ce52c776fc9b3476b4e8180b0412532ce0b76acff16a1270245d1b2c62ee95b1753cf3e8d85088038ce87002bed11f35fbbef0
-
SSDEEP
1536:nLjuaRPulw3Q37/cMZznQxy8Z1Qucgb9vLYOmzF8JAF15AYbel:LjXYwA37/pbX8Z1TB9jmF8y1bCl
Malware Config
Signatures
Files
-
423b8d480623bffba257ef686f8063ce1d1a3db44334f2125fd3f5db0c77d894.exe windows x86
56c886de19a47b2a1aae007a5f8430fa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ResetEvent
CloseHandle
GetCommandLineA
HeapCreate
TlsGetValue
lstrlenA
DeleteFileW
HeapDestroy
GetCommandLineA
GetStartupInfoA
VirtualQuery
CancelIo
CreateEventA
Sleep
GetTimeFormatA
GetModuleHandleA
GetVolumePathNameA
FindResourceW
GetEnvironmentVariableA
user32
GetSysColor
PeekMessageA
GetWindowLongA
DispatchMessageA
GetClassInfoA
CreateIcon
DrawTextW
DispatchMessageA
FindWindowA
CallWindowProcA
DestroyMenu
IsZoomed
IsWindow
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE