Static task
static1
Behavioral task
behavioral1
Sample
adb1564040bfc2de86850002ea486cee7b0b2b59b72e2bdd7cc2575eb7d5602d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
adb1564040bfc2de86850002ea486cee7b0b2b59b72e2bdd7cc2575eb7d5602d.exe
Resource
win10v2004-20220812-en
General
-
Target
adb1564040bfc2de86850002ea486cee7b0b2b59b72e2bdd7cc2575eb7d5602d
-
Size
491KB
-
MD5
ac79467b3da2f4214b6c6510b9a1fe1f
-
SHA1
025a2907892d812929f353050fc14d163a907e0d
-
SHA256
adb1564040bfc2de86850002ea486cee7b0b2b59b72e2bdd7cc2575eb7d5602d
-
SHA512
7cc5c21054bf1bb7bcf530308ce840b9aedb1b2a2b64471c80081b0f8daf04f237a6456caa8843da860523b8e5c5bdfd5b6d058ed3867ba5a078131fca4ee74b
-
SSDEEP
6144:VZvhKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDX:bvhqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
adb1564040bfc2de86850002ea486cee7b0b2b59b72e2bdd7cc2575eb7d5602d.exe windows x86
e6668ccd10b6f2da161cf94dbd71e74f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
DeleteFileA
GetDriveTypeA
DeviceIoControl
lstrlenA
GetStartupInfoA
CreateFileA
HeapCreate
TlsAlloc
GetModuleHandleA
SetEvent
IsBadStringPtrW
CreateFileMappingW
ReleaseMutex
HeapDestroy
IsDebuggerPresent
CloseHandle
CloseHandle
Sleep
GetModuleFileNameW
user32
LoadImageA
FindWindowW
IsWindow
IsZoomed
PeekMessageA
DispatchMessageA
DestroyMenu
GetIconInfo
DrawTextW
GetWindowLongA
CallWindowProcW
DestroyWindow
DispatchMessageA
cryptext
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ