Static task
static1
Behavioral task
behavioral1
Sample
86353075e1d22e4b941f8e605d07ad924b2b3f751f8c524bee21c32d78c5d373.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
86353075e1d22e4b941f8e605d07ad924b2b3f751f8c524bee21c32d78c5d373.exe
Resource
win10v2004-20221111-en
General
-
Target
86353075e1d22e4b941f8e605d07ad924b2b3f751f8c524bee21c32d78c5d373
-
Size
871KB
-
MD5
be18d1baf14b5e7a7e2c4bc56a49d3b7
-
SHA1
d41116246dfef664e6da747d65dae146da976b4d
-
SHA256
86353075e1d22e4b941f8e605d07ad924b2b3f751f8c524bee21c32d78c5d373
-
SHA512
740ca8cf55dd511e68ca049af648b16f0e348c7632c6b56760aa84dfe0a271e81975e9a8210d351aedfc48da324ae35cee55d8ad38657288b4f615e2e3289b6c
-
SSDEEP
12288:+YnD+/RVcy3iO0wsfIYxEG6rM2BwavHwzpVBW1ieFSFoKHEXRxbXLc:+n3iVwsfKdNB3wzQXFSaMEX7E
Malware Config
Signatures
Files
-
86353075e1d22e4b941f8e605d07ad924b2b3f751f8c524bee21c32d78c5d373.exe windows x86
9c9c233ac202fc1ffbfed50f04c1837d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetConsoleAliasA
Sleep
DeviceIoControl
CreateFileMappingW
lstrlenA
GetCommandLineA
TlsAlloc
DeleteFileA
CreateFileW
GetModuleHandleA
IsDebuggerPresent
ReleaseMutex
HeapDestroy
GetStartupInfoA
SetEvent
GetModuleFileNameW
HeapCreate
CloseHandle
CloseHandle
user32
CallWindowProcW
DestroyMenu
FindWindowW
DispatchMessageA
LoadImageA
IsWindow
GetIconInfo
GetWindowLongA
PeekMessageA
DestroyWindow
DrawTextW
DispatchMessageA
IsZoomed
cryptext
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
CryptExtAddPFX
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 863KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ