Static task
static1
Behavioral task
behavioral1
Sample
560afca3e6fd97329f25ac60d46facfaa833e62955f67cea5061b727f78c6450.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
560afca3e6fd97329f25ac60d46facfaa833e62955f67cea5061b727f78c6450.exe
Resource
win10v2004-20220812-en
General
-
Target
560afca3e6fd97329f25ac60d46facfaa833e62955f67cea5061b727f78c6450
-
Size
89KB
-
MD5
73bd323d26e78e4a77e7ea7ebcb8ad76
-
SHA1
10d4d6a07bfc6a0843ff57ea6c6287ea4faed66e
-
SHA256
560afca3e6fd97329f25ac60d46facfaa833e62955f67cea5061b727f78c6450
-
SHA512
2f76fc1fec7adec38f2a85a3396c2267e1e90f45f3568f098dd99ac301a6ccfddd06074d594c3f57f9c140da346636ba6efd5426da331828fbaab41538dbb329
-
SSDEEP
1536:uHshaIQ/AnNxAiiJvffxZgAdzZcgIHrL:u6wAN+i+JZgAlgH
Malware Config
Signatures
Files
-
560afca3e6fd97329f25ac60d46facfaa833e62955f67cea5061b727f78c6450.exe windows x86
588f2f34d77792c9625e97229b87a251
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
CreateMutexA
FreeConsole
ReleaseMutex
EnumResourceTypesA
GetDriveTypeA
GetTickCount
DeleteCriticalSection
GetVolumeInformationA
GetCommandLineA
GetLastError
GetModuleHandleA
TlsGetValue
GetComputerNameA
SearchPathA
SetLastError
VirtualProtect
Sleep
CloseHandle
GetExitCodeProcess
shell32
SHAlloc
SHFree
DragQueryPoint
StrChrA
ShellMessageBoxA
SHGetDiskFreeSpaceA
DragAcceptFiles
DragQueryFileA
SHGetMalloc
ShellAboutA
SHGetSettings
SHGetNewLinkInfo
DragFinish
SheChangeDirA
glmf32
glsChannel
glsComment
glsAppRef
glsBlock
glsBinary
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE