Static task
static1
Behavioral task
behavioral1
Sample
a66d122c20b6c3f6c1871324abb9913169a8a0e8c42b774cb861f5712e386e53.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a66d122c20b6c3f6c1871324abb9913169a8a0e8c42b774cb861f5712e386e53.exe
Resource
win10v2004-20221111-en
General
-
Target
a66d122c20b6c3f6c1871324abb9913169a8a0e8c42b774cb861f5712e386e53
-
Size
100KB
-
MD5
50db7733c2d02dcf101da75ca6d914f3
-
SHA1
423510f6341a8b859e059f8ffcd0847e8425eaaa
-
SHA256
a66d122c20b6c3f6c1871324abb9913169a8a0e8c42b774cb861f5712e386e53
-
SHA512
ddcbda6822132a5bd8b59715326ff850b0a7f58c14cced140393bdcc71ba5e48e08221afe0f3c8938a11bd552dfa21383a10b0078e21d7889fbe1efe7fc41ffa
-
SSDEEP
1536:ge7qMPQcL/4JH0RO4t/WFTIvJ7Kq65/KEjMdg4RX4FhVahjFmOjodXXrHX3iEA14:L1453AWYK1ZQd3QhMXmOerHX3tO+
Malware Config
Signatures
Files
-
a66d122c20b6c3f6c1871324abb9913169a8a0e8c42b774cb861f5712e386e53.exe windows x86
44cd0c0a87c493ce8de1aecb7215fd72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadReadPtr
CloseHandle
LoadLibraryExW
VirtualProtectEx
CreateMutexA
FindClose
IsDebuggerPresent
GetConsoleTitleA
lstrlenA
GlobalUnlock
EnumResourceTypesW
FreeConsole
LocalFree
CancelIo
GetStdHandle
CreateEventA
GetSystemTime
GetModuleHandleA
GlobalLock
GetLastError
user32
GetDlgItemTextA
GetKeyState
GetMessageA
LoadCursorA
IsMenu
EnumWindows
GetParent
DialogBoxParamA
IsIconic
GetMessageA
GetSubMenu
CreateWindowExA
EndDialog
MessageBoxA
clbcatq
GetCatalogObject
GetComputerObject
SetSetupOpen
CheckMemoryGates
ComPlusMigrate
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ