Static task
static1
Behavioral task
behavioral1
Sample
bb8b81eb4a61a96c67b1238173653f86a98dd9977cbea06856742daca7d8dcd3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb8b81eb4a61a96c67b1238173653f86a98dd9977cbea06856742daca7d8dcd3.exe
Resource
win10v2004-20220901-en
General
-
Target
bb8b81eb4a61a96c67b1238173653f86a98dd9977cbea06856742daca7d8dcd3
-
Size
391KB
-
MD5
8a6f79b1678137ae2e89b491e2dad6f3
-
SHA1
28313ddcc04fb4084b080b6358cf8c0954ca2014
-
SHA256
bb8b81eb4a61a96c67b1238173653f86a98dd9977cbea06856742daca7d8dcd3
-
SHA512
932d58572ff339b2e04b0d8152cede6284577b3eec745818e3af91ce00795939ae636c3952e20d4021c38e6e7f3b136789069767f2a8e9dd47b74c0bf3ef7ca9
-
SSDEEP
12288:Uw1CjRMdHEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:n6RMdkAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
Files
-
bb8b81eb4a61a96c67b1238173653f86a98dd9977cbea06856742daca7d8dcd3.exe windows x86
c7c48ae6fdae653eb0dee311015c9336
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
FindClose
FindAtomA
GetFileTime
WriteFile
ReleaseMutex
ReleaseMutex
GetPrivateProfileStringA
TlsGetValue
GetCurrentThreadId
InitializeCriticalSection
HeapCreate
GetDriveTypeA
LocalFree
GetCurrentProcessId
LoadLibraryW
CreateEventW
lstrlenW
IsBadStringPtrW
GlobalFlags
user32
CallWindowProcW
DrawTextA
CreateWindowExA
IsWindow
DispatchMessageA
GetSysColor
GetSysColor
DrawStateW
GetKeyboardType
GetClassInfoA
GetClientRect
EndDialog
SetFocus
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ