Static task
static1
Behavioral task
behavioral1
Sample
c24761408ad4229c1036d1fef685f32f3f4a7d30c58ec41fc8ae3a6e97ba5517.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c24761408ad4229c1036d1fef685f32f3f4a7d30c58ec41fc8ae3a6e97ba5517.exe
Resource
win10v2004-20220812-en
General
-
Target
c24761408ad4229c1036d1fef685f32f3f4a7d30c58ec41fc8ae3a6e97ba5517
-
Size
370KB
-
MD5
585d51a9bd24d3e8fde022525306d846
-
SHA1
605ed6413e81a0425a9fa99265699c141cdba287
-
SHA256
c24761408ad4229c1036d1fef685f32f3f4a7d30c58ec41fc8ae3a6e97ba5517
-
SHA512
4ff7c31199309da6daef64ab595e81f1824abe4e176e23ddac4b61cd38575c1c0cc545617404a17f7869408d3fa625232410f0fec880f12ff65758f650ce6eb2
-
SSDEEP
6144:DU0HZ0kTemqQypbpL9r7t6avCge9WDYbSwv1S9a5YQVJE/54HFq3eUj9NM6ZrddR:DU0Hv7Czxr5JvCr9hv14IYQV6/SRk9uM
Malware Config
Signatures
Files
-
c24761408ad4229c1036d1fef685f32f3f4a7d30c58ec41fc8ae3a6e97ba5517.exe windows x86
c24ec0415ee50ef7a577269fa58b497e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
CloseHandle
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
GetTickCount
GetModuleHandleA
CreateFileA
LoadLibraryA
GetSystemDirectoryA
GetCurrentThreadId
GetStartupInfoA
OpenMutexA
CreateMutexA
GetProcAddress
Sleep
user32
PostThreadMessageA
GetInputState
GetMessageA
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
msvcrt
exit
_controlfp
strcat
_itoa
malloc
strlen
strcmp
_except_handler3
strtok
memset
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 327KB - Virtual size: 327KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ