Static task
static1
Behavioral task
behavioral1
Sample
b4bfae69c274d5ac9557e61478040412b49e5e1585684464383e7fad4f5d8698.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4bfae69c274d5ac9557e61478040412b49e5e1585684464383e7fad4f5d8698.exe
Resource
win10v2004-20220812-en
General
-
Target
b4bfae69c274d5ac9557e61478040412b49e5e1585684464383e7fad4f5d8698
-
Size
81KB
-
MD5
c6fdfcc5497ddb62bc04fd8e8b31a7ee
-
SHA1
890d55371817ab672e946ec22c1f36926cd34c55
-
SHA256
b4bfae69c274d5ac9557e61478040412b49e5e1585684464383e7fad4f5d8698
-
SHA512
fe768a4ead166c8fd551f233062e55fa4558d6ebacfc146625c2d65d196fd6c591d0ed37ae60636abbfd55398795b43c90b9bd71e88b1bfd5e1f63fc08d4f367
-
SSDEEP
1536:f5/6mBpT02E78R0/t51AwxHG3IAR2PYBMNSNmyExG+cW6el4cgl31Y:f5CmBpQfQREVp2Z2MhNzE4el4lhq
Malware Config
Signatures
Files
-
b4bfae69c274d5ac9557e61478040412b49e5e1585684464383e7fad4f5d8698.exe windows x86
e304217fc16c011615a0ec22783cbfae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
SearchPathA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 24KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 44KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE