Static task
static1
Behavioral task
behavioral1
Sample
b7d32111ea0891ad554e3db108f7684b8f1e72ab36fe3cfd70da3bd2d6b7d628.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b7d32111ea0891ad554e3db108f7684b8f1e72ab36fe3cfd70da3bd2d6b7d628.exe
Resource
win10v2004-20220812-en
General
-
Target
b7d32111ea0891ad554e3db108f7684b8f1e72ab36fe3cfd70da3bd2d6b7d628
-
Size
811KB
-
MD5
e9d3fe16fdd4b71366eecf90a70b1e5b
-
SHA1
82461a6f06fe1826d8f692b8a0be6b8297aa43eb
-
SHA256
b7d32111ea0891ad554e3db108f7684b8f1e72ab36fe3cfd70da3bd2d6b7d628
-
SHA512
6276f2ad4862da92eb9c776610f34745af197c066159f3c27b6bdc2b87719afc874a82fba5f96e1490970deca5b1419f8c7a660e3e2be6cf3f411e387d816707
-
SSDEEP
12288:7uCcEsc7izD3Cseh06DyOCvU58ORgs+R80rxoB3wDJsSkOnAETjB/TurxrvJ7:yC2U+ZUmxllo+V9fTjBylF
Malware Config
Signatures
Files
-
b7d32111ea0891ad554e3db108f7684b8f1e72ab36fe3cfd70da3bd2d6b7d628.exe windows x86
9dac8b9eac29c70c1028250978465608
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
FindClose
GetFileAttributesW
TlsGetValue
VirtualAlloc
FindAtomA
GetComputerNameA
GetLastError
CreateFileA
GetLocalTime
TlsAlloc
GetTickCount
GetModuleHandleW
GetPrivateProfileIntA
CloseHandle
SetLastError
GlobalFree
ExitProcess
lstrlenW
MapViewOfFile
user32
CallWindowProcA
GetClientRect
GetCaretPos
CloseWindow
GetClassInfoA
EndDialog
GetDlgItem
DrawStateA
DestroyCaret
GetMenu
CreateWindowExA
FillRect
DispatchMessageA
clbcatq
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
d3dim
D3DFree
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 801KB - Virtual size: 801KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ