Static task
static1
Behavioral task
behavioral1
Sample
31003e3aec3693eb23353181e922d8683ef1ba150f6731aa71f4ff39ad6dd778.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
31003e3aec3693eb23353181e922d8683ef1ba150f6731aa71f4ff39ad6dd778.exe
Resource
win10v2004-20220812-en
General
-
Target
31003e3aec3693eb23353181e922d8683ef1ba150f6731aa71f4ff39ad6dd778
-
Size
306KB
-
MD5
271b3a9d54c01544c663959c79789410
-
SHA1
4c38c73f36138f4e7194854a682d4da56e0f3fcb
-
SHA256
31003e3aec3693eb23353181e922d8683ef1ba150f6731aa71f4ff39ad6dd778
-
SHA512
a1cf6c5d2976fe8e7428bd9e34fbf4522ea00431c9c4c0ff08a2b3fcf67881cf5c8517c047fe8acfea1712d458f3d35585a9942d99cd25922af56c3f20c9ff1a
-
SSDEEP
6144:WXFVZ9MTMVWg9NoALr2SOR9VdVE63fUrHUygKliBQNlzAy0lB:EVXogz5rs9C8fUlgsSQNf0lB
Malware Config
Signatures
Files
-
31003e3aec3693eb23353181e922d8683ef1ba150f6731aa71f4ff39ad6dd778.exe windows x86
517c75b8494dbcb097498d0f14771494
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
CreatePipe
DeleteFileA
GetConsoleAliasA
LoadLibraryA
SetCurrentDirectoryA
DeviceIoControl
CreateMailslotA
GetShortPathNameW
CreateSemaphoreW
GetACP
CreateFileMappingW
DeleteFileA
WriteConsoleW
GetStringTypeW
SetEnvironmentVariableA
GetModuleHandleW
SetVolumeLabelW
FatalExit
DeleteFileA
GetProcessHeap
GetStringTypeW
VirtualAlloc
mshtml
ShowModelessHTMLDialog
DllEnumClassObjects
ShowModalDialog
ShowHTMLDialog
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE