Static task
static1
Behavioral task
behavioral1
Sample
ba4975b5d3855e14465b8b57233b115003b0ef26b103db920f1e6b617237eee6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba4975b5d3855e14465b8b57233b115003b0ef26b103db920f1e6b617237eee6.exe
Resource
win10v2004-20220812-en
General
-
Target
ba4975b5d3855e14465b8b57233b115003b0ef26b103db920f1e6b617237eee6
-
Size
8KB
-
MD5
4124d26ff89d04b5afbb982f9eb50cf1
-
SHA1
625ecdb1d6eacbf0b86f16863476f871f5ece545
-
SHA256
ba4975b5d3855e14465b8b57233b115003b0ef26b103db920f1e6b617237eee6
-
SHA512
0129326505467958ca71e1e233cb64ec70422114dba7beb6a8ac6f5ca54291025cd3302ed0e9dc2fc30d80115a59f9dcacaf8a2c945bc66e5fd02e8d704d5cda
-
SSDEEP
192:htmDdiTc16VXOMuE6FRFxauSH+3oOf3T0:gqS8VH6m+
Malware Config
Signatures
Files
-
ba4975b5d3855e14465b8b57233b115003b0ef26b103db920f1e6b617237eee6.exe windows x86
7cb019d913e7a65509e3b6bb2d89f91a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventW
ReadFile
FindClose
GetDriveTypeW
HeapCreate
GetPrivateProfileStringA
LocalFlags
GetConsoleAliasA
EnterCriticalSection
SetLastError
EnumCalendarInfoA
LocalFree
GetCurrentThreadId
GetModuleHandleA
GetNumberFormatA
TlsGetValue
lstrlenW
ResumeThread
GetCurrentProcessId
FindAtomA
user32
GetKeyboardType
GetKeyState
DrawTextA
IsWindow
GetCursorInfo
SetFocus
CallWindowProcW
GetMenuInfo
GetSysColor
GetClassInfoA
DispatchMessageA
DispatchMessageA
GetClientRect
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ