Static task
static1
Behavioral task
behavioral1
Sample
a1161f80f80fb99918c3d1d5be06103faccbd15b39834979c5181f5b73398d21.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a1161f80f80fb99918c3d1d5be06103faccbd15b39834979c5181f5b73398d21.exe
Resource
win10v2004-20221111-en
General
-
Target
a1161f80f80fb99918c3d1d5be06103faccbd15b39834979c5181f5b73398d21
-
Size
131KB
-
MD5
72e7a5e8baa05f95ebf1773a3735a390
-
SHA1
c40dc7e2fb7f12cb5487cfea2630887025aa406d
-
SHA256
a1161f80f80fb99918c3d1d5be06103faccbd15b39834979c5181f5b73398d21
-
SHA512
7574b162e6b5c7ae50f406e1615a2abd40411d8347f244b708f09345b5bd4c49d1aa6c3028d7e8dab136ac6b83d5ff23d0fc8fb299d93eb916e4218d708834ec
-
SSDEEP
3072:F8OYb8yXnLhijj9oyDBeTBI3cocKZJ3p2:F8BHL4jjuENHj
Malware Config
Signatures
Files
-
a1161f80f80fb99918c3d1d5be06103faccbd15b39834979c5181f5b73398d21.exe windows x86
e4d64b51e4ce179dc40cdf7f6764f48d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
HeapDestroy
ResetEvent
CreateFileMappingA
ReleaseMutex
SetLastError
HeapCreate
SetEvent
GetStartupInfoA
TlsAlloc
GetModuleFileNameA
GetCommandLineW
GetStdHandle
GetEnvironmentVariableA
IsBadCodePtr
GetModuleHandleA
CreateFileA
GetFileAttributesW
TlsGetValue
lstrlenA
user32
DispatchMessageA
DispatchMessageA
GetWindowLongA
GetClassInfoA
GetSysColor
DestroyMenu
IsWindow
CallWindowProcW
FindWindowA
CreateIcon
IsZoomed
PeekMessageA
DrawTextW
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE