Static task
static1
Behavioral task
behavioral1
Sample
b7867bc7ea02b3a96916385057000e29fdcbf5437f3b8790b842c5357cabbe3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7867bc7ea02b3a96916385057000e29fdcbf5437f3b8790b842c5357cabbe3e.exe
Resource
win10v2004-20220901-en
General
-
Target
b7867bc7ea02b3a96916385057000e29fdcbf5437f3b8790b842c5357cabbe3e
-
Size
169KB
-
MD5
a149593304f88bffb85bbbbefeae26d0
-
SHA1
3a2447d4182d93be1e9e04b140e1130e3c2e9766
-
SHA256
b7867bc7ea02b3a96916385057000e29fdcbf5437f3b8790b842c5357cabbe3e
-
SHA512
6191aa4515ae4f15e7d4411fde3a401195280c42a8043075903292f2dcde55bd8b20aad237e84b28502ed9e6030d5c83f19985e54da89e61c0775c7713abd01a
-
SSDEEP
3072:Au2RM0oZk+YK5hLYXcf/YCXRmuAuRt2+7lonjPFYaCuD5in01s:D2RMLhrVf/DRauRHlwrFYaN5inos
Malware Config
Signatures
Files
-
b7867bc7ea02b3a96916385057000e29fdcbf5437f3b8790b842c5357cabbe3e.exe windows x86
c143dc0a02490c88373b0a01bada2f67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetDriveTypeW
GetModuleHandleA
SetLastError
GetPrivateProfileStringW
FindAtomW
GetFileAttributesA
EnterCriticalSection
GetCurrentThreadId
SetEvent
lstrlenA
CreateMailslotA
FindClose
HeapCreate
ReadFile
GetConsoleAliasW
GetModuleFileNameA
ResumeThread
LocalFree
EnumCalendarInfoW
user32
GetMenuInfo
DispatchMessageA
CallWindowProcW
GetSysColor
IsWindow
DrawTextW
GetKeyboardType
GetKeyState
GetClassInfoA
GetCursorInfo
DispatchMessageA
SetFocus
GetClientRect
admparse
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 492KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 357KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ