Static task
static1
Behavioral task
behavioral1
Sample
b78adfb61a8f0bd9d9a9894cc05075260eebfd2eb7cc2bcb4f770d04f6aed096.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b78adfb61a8f0bd9d9a9894cc05075260eebfd2eb7cc2bcb4f770d04f6aed096.exe
Resource
win10v2004-20221111-en
General
-
Target
b78adfb61a8f0bd9d9a9894cc05075260eebfd2eb7cc2bcb4f770d04f6aed096
-
Size
748KB
-
MD5
488b7c7d0c411726ba67b5ba50939f09
-
SHA1
be31ba55baaa31a0dc7d4c815fc4537734a0c995
-
SHA256
b78adfb61a8f0bd9d9a9894cc05075260eebfd2eb7cc2bcb4f770d04f6aed096
-
SHA512
3d8845a41327d50126db7ddae5b1b3a05221652e9cf70c4aebfc643f70ff07e3f371a08bbaa7d77b37d77271bed7d3a484797c7dc8f94fcebcd03a2365d8293c
-
SSDEEP
12288:QS+g1ttieE+EctD644tAsKsHLW5TDDg2p3tuzSHAAhMnuuIdGJ6Z0:QS+QYeE+EctD6TAiHLW5TQIqGAuMnuX/
Malware Config
Signatures
Files
-
b78adfb61a8f0bd9d9a9894cc05075260eebfd2eb7cc2bcb4f770d04f6aed096.exe windows x86
728f0af6fbaecfb7e7422d395fd5ae07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomW
HeapFree
CloseHandle
GetModuleHandleA
RemoveDirectoryA
CreateSemaphoreW
ExitThread
FindAtomA
SetEndOfFile
WriteFile
DeleteAtom
HeapCreate
CreatePipe
GetTapeStatus
WaitForMultipleObjects
CreateDirectoryA
GetVersion
FindClose
IsBadWritePtr
GetFileType
SetVolumeLabelA
GetDriveTypeA
GetModuleFileNameA
RemoveDirectoryA
GetCommandLineA
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
odbcbcp
bcp_bind
bcp_bind
bcp_bind
bcp_bind
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE