Static task
static1
Behavioral task
behavioral1
Sample
4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511.exe
Resource
win10v2004-20221111-en
General
-
Target
4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511
-
Size
65KB
-
MD5
03f736672d601647f23cbc669fd7fb00
-
SHA1
41def8dde9dfd38ed7659c65764da123057a909b
-
SHA256
4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511
-
SHA512
59c8fb9275ab3467b525bad493239955641f79392bbf49f84c91c1abd1f6eaa2b51480e245fbf542fb86be782558042ab2611dec25972c57e3bf07dbfab802dc
-
SSDEEP
1536:J+zyufCGyoBKvalBCRpZuQWGz7+MujWod:J+VhyoBK3zStd
Malware Config
Signatures
Files
-
4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511.exe windows x86
e75e65568e4e91fbfe23b462b91963b9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
CreateSemaphoreW
GetModuleHandleW
LoadLibraryA
SetEnvironmentVariableA
SetVolumeLabelW
FatalExit
CreateMailslotA
DeviceIoControl
DeleteFileA
WriteConsoleW
GetConsoleAliasA
GetShortPathNameW
DeleteFileA
DeleteFileA
SetCurrentDirectoryA
VirtualAlloc
InitializeCriticalSection
GetStringTypeA
GetACP
CreatePipe
CreateFileMappingW
GetProcessHeap
mshtml
ShowModalDialog
ShowHTMLDialog
DllEnumClassObjects
ShowModelessHTMLDialog
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ