Static task
static1
Behavioral task
behavioral1
Sample
f5714c21ccff4250e39f7035521544c12c50a0b7c8f62fff92d9f881eba967c3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f5714c21ccff4250e39f7035521544c12c50a0b7c8f62fff92d9f881eba967c3.exe
Resource
win10v2004-20220812-en
General
-
Target
f5714c21ccff4250e39f7035521544c12c50a0b7c8f62fff92d9f881eba967c3
-
Size
491KB
-
MD5
aded1f39fca20ea86c09d635c4b2c630
-
SHA1
75cb0341c7aa458b74cf691a0b755441c8a377c4
-
SHA256
f5714c21ccff4250e39f7035521544c12c50a0b7c8f62fff92d9f881eba967c3
-
SHA512
e7985d0157fd3551df22dc093605fc1726b8f740c78524a9a984745b43ccd2e4c8f523a2cb44e39bc9dedf1b9b0511cf10f4bfc636b72964fb387231c210bbe6
-
SSDEEP
6144:p5hKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDk:vhqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
f5714c21ccff4250e39f7035521544c12c50a0b7c8f62fff92d9f881eba967c3.exe windows x86
a8ce5cdaa62be52859a8385018f16d44
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetDriveTypeA
GetModuleFileNameW
ReleaseMutex
IsDebuggerPresent
CreateFileMappingW
DeviceIoControl
TlsAlloc
Sleep
HeapDestroy
GetModuleHandleA
CloseHandle
IsBadStringPtrW
HeapCreate
CloseHandle
lstrlenA
CreateFileA
PulseEvent
DeleteFileA
GetCommandLineA
user32
IsWindow
GetIconInfo
DispatchMessageA
FindWindowW
DestroyWindow
GetWindowLongA
DestroyMenu
LoadImageA
DrawTextW
IsZoomed
CallWindowProcW
DispatchMessageA
PeekMessageA
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ