Static task
static1
Behavioral task
behavioral1
Sample
f1c367307382c4f59ce11114a3f67c0d5b6e94352974f459301a7d707d4225b3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f1c367307382c4f59ce11114a3f67c0d5b6e94352974f459301a7d707d4225b3.exe
Resource
win10v2004-20220901-en
General
-
Target
f1c367307382c4f59ce11114a3f67c0d5b6e94352974f459301a7d707d4225b3
-
Size
499KB
-
MD5
fe96895b5277ab387d720b593e89769c
-
SHA1
e5ce4c44562cb8f87cd74624ba2e79dfbab947fe
-
SHA256
f1c367307382c4f59ce11114a3f67c0d5b6e94352974f459301a7d707d4225b3
-
SHA512
9d73541c9591269529130b210128098074247d88df5955c4e7959b6a08e9f0692398f63430ef422134496605cf8d6132f08e9600799ac95cac1a92a49b9bd59c
-
SSDEEP
6144:9hvkZ8gulzV2V9/H5DTwaHd6dcNiXPnpUTJPyd+MElqwkp7:fMZu2z96dcYXPnpcJPydjZ
Malware Config
Signatures
Files
-
f1c367307382c4f59ce11114a3f67c0d5b6e94352974f459301a7d707d4225b3.exe windows x86
20e764ef80c39483a71c448257e17d21
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
GetDriveTypeA
ResumeThread
DeviceIoControl
DeleteFileA
PulseEvent
SuspendThread
TlsAlloc
lstrlenA
CreateFileMappingA
GetModuleHandleA
HeapCreate
IsDebuggerPresent
CancelIo
TlsGetValue
CreateFileA
IsBadStringPtrA
GetStartupInfoA
GetModuleFileNameA
GetACP
user32
IsWindow
CallWindowProcW
DestroyWindow
DispatchMessageA
LoadImageA
GetIconInfo
FindWindowW
IsZoomed
GetWindowLongA
DrawTextW
DestroyMenu
PeekMessageA
DispatchMessageA
amstream
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
cryptui
LocalEnroll
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ