Static task
static1
Behavioral task
behavioral1
Sample
74c530a02e54fe45a831b11bc03fe9eb768ac64e57272f208a66de4f70bdfa68.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
74c530a02e54fe45a831b11bc03fe9eb768ac64e57272f208a66de4f70bdfa68.exe
Resource
win10v2004-20220901-en
General
-
Target
74c530a02e54fe45a831b11bc03fe9eb768ac64e57272f208a66de4f70bdfa68
-
Size
751KB
-
MD5
7d18f3656061cb431c8cfa46421cdab8
-
SHA1
1775f7bb100e67d661a183e83cfbb79ff5bef687
-
SHA256
74c530a02e54fe45a831b11bc03fe9eb768ac64e57272f208a66de4f70bdfa68
-
SHA512
eab53c28b47805fed3c39174bf93dc9269536348bf3d6a631a8fea5f2818377448ca23c16154bbcb63f2b2a5cd6a8777bf0523c5d10f8c20f91d132576bb0b5d
-
SSDEEP
12288:nOMbAa2WZCLR1npP+gjOFnHXBd7vGcpvo9NVinA4XoyKFXgsiHy0u5rI72O:nOmAMC/pPK1HXb7vl40VSXgjHy0u0
Malware Config
Signatures
Files
-
74c530a02e54fe45a831b11bc03fe9eb768ac64e57272f208a66de4f70bdfa68.exe windows x86
3220dec9636235e8a73bb70239c82c9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
ExitProcess
ClearCommBreak
GetCommandLineW
CreateMutexA
GetEnvironmentVariableW
SetEvent
GetModuleHandleA
VirtualAllocEx
ReleaseMutex
SetLastError
GetStartupInfoA
RemoveDirectoryA
WriteConsoleA
GetTickCount
OpenProcess
CreateFileA
HeapSize
DeleteFileW
SetConsoleCP
ResetEvent
user32
GetCaretPos
GetClassInfoA
DispatchMessageW
GetCursorInfo
GetDC
FindWindowA
CallWindowProcW
GetDC
PeekMessageA
GetDC
GetSysColor
GetWindowLongA
DispatchMessageW
linkinfo
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
CreateLinkInfoA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 745KB - Virtual size: 745KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ