Static task
static1
Behavioral task
behavioral1
Sample
bd2f42502acfe1ad6a65daa07b2d9d281fe7384f6e7901a19d92639a2935b186.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bd2f42502acfe1ad6a65daa07b2d9d281fe7384f6e7901a19d92639a2935b186.exe
Resource
win10v2004-20220812-en
General
-
Target
bd2f42502acfe1ad6a65daa07b2d9d281fe7384f6e7901a19d92639a2935b186
-
Size
370KB
-
MD5
37decd8b8c19e83fd713170c848af90d
-
SHA1
2476cefbe22b262a0420b96be98e4bdad3007c1b
-
SHA256
bd2f42502acfe1ad6a65daa07b2d9d281fe7384f6e7901a19d92639a2935b186
-
SHA512
133aae1fda9aea0bf778b6be3fce597078126a36ab88c1995d998cdf25f9793fc1a1c969c2098d4bc83d195f1e7ba357e63050a2e7c709707f836d21e4c9c01c
-
SSDEEP
6144:8gm1aZCkx2o4sGmn8rv4DNpTaQzRmPQ8QiG8AKMEvxkNGkfnCJ49ijMXC:ZFqon8rvgp49VMEZMfna49ijM
Malware Config
Signatures
Files
-
bd2f42502acfe1ad6a65daa07b2d9d281fe7384f6e7901a19d92639a2935b186.exe windows x86
445043afe54aa04faa018f7e4ce7d9e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
GetExitCodeProcess
ReleaseMutex
LocalSize
GetMailslotInfo
GetPrivateProfileIntW
FindVolumeClose
CloseHandle
CreateThread
ResetEvent
VirtualAlloc
GlobalFree
LocalFree
lstrlenA
FreeConsole
InterlockedExchange
CreateFileW
GetModuleHandleW
GetProcessHeap
ReadFile
user32
IsIconic
GetClientRect
EndDialog
DispatchMessageA
GetClassInfoA
GetMenu
DrawStateW
GetDlgItem
CallWindowProcW
SetFocus
GetSysColor
CreateWindowExA
GetCursorInfo
dsprop
CheckADsError
CheckADsError
ReportError
CheckADsError
CheckADsError
desk.cpl
InstallScreenSaverW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ