Static task
static1
Behavioral task
behavioral1
Sample
b2b342c9833269a030946d4b4f65afb79b0ca571da85c7ed9b88786c8994c6f5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b2b342c9833269a030946d4b4f65afb79b0ca571da85c7ed9b88786c8994c6f5.exe
Resource
win10v2004-20220901-en
General
-
Target
b2b342c9833269a030946d4b4f65afb79b0ca571da85c7ed9b88786c8994c6f5
-
Size
297KB
-
MD5
bcfdf23381ecff5f96b4be8ed33a01e1
-
SHA1
7785b6a30261635befabc8937bb6c7f261804319
-
SHA256
b2b342c9833269a030946d4b4f65afb79b0ca571da85c7ed9b88786c8994c6f5
-
SHA512
d3e88a89da10b18c29131b3bea4f4f9ce6780345ac1fa77d120d3f6f1062af05ec5be17a3263d28cc203bd2d72b4f916fdc3228f5cb3a1c73eec86a043bbc142
-
SSDEEP
6144:XIHZHIZtV1LhNAlYV7K+VL4abU6ovZsih1K8KVZT/t9YfU5:GZHIZtdNAlYGFvZ3XK82/9W
Malware Config
Signatures
Files
-
b2b342c9833269a030946d4b4f65afb79b0ca571da85c7ed9b88786c8994c6f5.exe windows x86
34c28a36ec88fbc992b83f3e8ed9de55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoW
HeapCreate
EnterCriticalSection
FindAtomW
GetModuleHandleA
lstrlenW
TlsGetValue
GetCurrentThreadId
GetModuleFileNameA
ResumeThread
GetDriveTypeW
SetEvent
FindClose
GetNumberFormatW
LocalFree
GetConsoleAliasW
GetCurrentProcessId
ReadFile
GetPrivateProfileStringW
SetLastError
user32
GetKeyState
IsWindow
DispatchMessageA
GetMenuInfo
GetClassInfoA
GetSysColor
GetKeyboardType
CallWindowProcW
GetClientRect
GetCursorInfo
SetFocus
DrawTextW
DispatchMessageA
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ