Static task
static1
Behavioral task
behavioral1
Sample
b95cc33a65af8f150db7630e6a1d3e38820b92e322516874a790a3ebec415af5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b95cc33a65af8f150db7630e6a1d3e38820b92e322516874a790a3ebec415af5.exe
Resource
win10v2004-20221111-en
General
-
Target
b95cc33a65af8f150db7630e6a1d3e38820b92e322516874a790a3ebec415af5
-
Size
806KB
-
MD5
8f3a03f858570b360b65d4bf3fcb71b8
-
SHA1
c2cee33246f6e84f49477dacba30c81558e72f58
-
SHA256
b95cc33a65af8f150db7630e6a1d3e38820b92e322516874a790a3ebec415af5
-
SHA512
a45353ad1594e2845812b6089742915682086609dad0241e9b86cf95bc6ea746c822fedcdef058bb0852f2f9bf3f68599f8836532e737d629d97f057bc0682b8
-
SSDEEP
24576:byEH/tfsAHrlPqNdFPYDudM0Xq3Z+FwR:3fFYHFPQujapuwR
Malware Config
Signatures
Files
-
b95cc33a65af8f150db7630e6a1d3e38820b92e322516874a790a3ebec415af5.exe windows x86
c4082321e9a798e8b403d9254d67f3b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntW
GetACP
ResetEvent
LocalSize
LocalFree
WriteFile
FreeConsole
FindVolumeClose
GetMailslotInfo
lstrlenA
GlobalFree
GetDriveTypeW
ResumeThread
InterlockedExchange
GetExitCodeProcess
GetEnvironmentVariableA
VirtualAlloc
GetModuleHandleW
CreateThread
CloseHandle
user32
GetClassInfoA
DrawStateW
IsWindow
GetSysColor
CallWindowProcW
CreateWindowExA
SetFocus
GetCursorInfo
GetClientRect
EndDialog
DispatchMessageA
GetSysColor
GetKeyboardType
qedit
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllUnregisterServer
DllGetClassObject
sysdm.cpl
NoExecuteAddFileOptOutList
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 797KB - Virtual size: 796KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ