Static task
static1
Behavioral task
behavioral1
Sample
89bca04a0cf3761725d72ab0c378df8289c28742229f1bc2d7e6981db6a81bdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89bca04a0cf3761725d72ab0c378df8289c28742229f1bc2d7e6981db6a81bdf.exe
Resource
win10v2004-20221111-en
General
-
Target
89bca04a0cf3761725d72ab0c378df8289c28742229f1bc2d7e6981db6a81bdf
-
Size
305KB
-
MD5
86228932cd337bccf7bb2d4d34c345fc
-
SHA1
90126a37a4f1507ca414d00d595275a15f54aa55
-
SHA256
89bca04a0cf3761725d72ab0c378df8289c28742229f1bc2d7e6981db6a81bdf
-
SHA512
1729817fc5c81c8fb4d7d544765f8df92f364db07eb560de858ffe1a4995856260593cf702a48a3a9d73bc43dbf86ac15872ee3103d21f8ac29f4e1e8fb32c9a
-
SSDEEP
6144:1hVpCgrxqyI99wAH2idu0SUJw/D4jyT9A8op5zeUB2:1XtxqybAH2idujUWszvB
Malware Config
Signatures
Files
-
89bca04a0cf3761725d72ab0c378df8289c28742229f1bc2d7e6981db6a81bdf.exe windows x86
fc24a42ca07a0ccf5369462dd174c452
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatW
GetConsoleAliasW
TlsGetValue
GetModuleFileNameA
ReadFile
ResumeThread
LocalFree
FindClose
GetCurrentProcessId
GetPrivateProfileStringW
EnumCalendarInfoW
lstrlenW
EnterCriticalSection
GetModuleHandleA
SetEvent
GetDriveTypeW
HeapCreate
GetCurrentThreadId
SetLastError
FindAtomW
user32
DrawTextA
SetFocus
GetClientRect
DispatchMessageA
GetKeyState
GetClassInfoA
DispatchMessageA
GetKeyboardType
GetSysColor
GetMenuInfo
CallWindowProcW
GetCursorInfo
IsWindow
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ