Static task
static1
Behavioral task
behavioral1
Sample
b351e10b04f8e42d224474203dec49ce639b0006e10473255548581a8c60cf7b.exe
Resource
win7-20220901-en
General
-
Target
b351e10b04f8e42d224474203dec49ce639b0006e10473255548581a8c60cf7b
-
Size
118KB
-
MD5
ad56dd5b9742da8230201337ae4dc149
-
SHA1
800db30afb92951d5dea9efaaa9ca908941c1f8b
-
SHA256
b351e10b04f8e42d224474203dec49ce639b0006e10473255548581a8c60cf7b
-
SHA512
31598fce2a4a111734c72c9d3458dfbf5cc241502b844c9b21216db44634061bc100b2063e8a78d5fe3f6a395da39e11e5e0da21a6be82473ac4aa1f634f5d6b
-
SSDEEP
768:7E5yf3fzoR/wno0wRmrVerR1lfZrVGs7bWzO4DjJuMtL0:o5ePcR/co0wkVe91pZrVGs7izO4J/d0
Malware Config
Signatures
Files
-
b351e10b04f8e42d224474203dec49ce639b0006e10473255548581a8c60cf7b.exe windows x86
86842069ef527f3c796ebd97e99eb984
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
kernel32
WaitForSingleObject
CreateThread
lstrcatA
GetLastError
CreateMutexA
lstrcmpA
lstrcpyA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
GetCommandLineA
WriteProcessMemory
lstrlenW
ExitProcess
Sleep
ReadProcessMemory
GetModuleHandleA
GetCurrentProcess
IsDebuggerPresent
lstrcmpiA
AllocConsole
CloseHandle
HeapFree
GetEnvironmentVariableA
HeapAlloc
GetStartupInfoA
GetProcessHeap
lstrlenA
GetModuleFileNameW
user32
IsWindow
UpdateWindow
InsertMenuA
MessageBoxW
MessageBoxA
CallWindowProcA
TrackPopupMenu
PostQuitMessage
gdi32
RealizePalette
BitBlt
SelectObject
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE