Static task
static1
Behavioral task
behavioral1
Sample
b4200ca1a6d6d92d609049e902507978e65fbd06de200dee3cc4db2f9ac19ec0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4200ca1a6d6d92d609049e902507978e65fbd06de200dee3cc4db2f9ac19ec0.exe
Resource
win10v2004-20220812-en
General
-
Target
b4200ca1a6d6d92d609049e902507978e65fbd06de200dee3cc4db2f9ac19ec0
-
Size
56KB
-
MD5
61655e77cac956caea0a00b78d8cd224
-
SHA1
bcb99ae1641bbfe0e41fff89617765c512dbf44e
-
SHA256
b4200ca1a6d6d92d609049e902507978e65fbd06de200dee3cc4db2f9ac19ec0
-
SHA512
273b5507a6a07eec2a4507e69211d50231b147184d7e737cccf9e1dda5a372684aa326e36c9ac60a81cc0b79163c62e81dc377a94b506fb31224abbfb3bd6291
-
SSDEEP
768:Jcn57q8uv7BGdFdN6r9iXW9ofVj3lU8olTRdRlKHeG/KlM5eJ1z7OYhLgh:+5Gxkd1jm9oF3lE7R0HeRlM5fWy
Malware Config
Signatures
Files
-
b4200ca1a6d6d92d609049e902507978e65fbd06de200dee3cc4db2f9ac19ec0.exe windows x86
7c6f0c8dcc557e3164fcb1b04298d946
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
FindResourceA
LocalFree
CreateFileA
IsBadStringPtrW
GetModuleHandleA
HeapCreate
CloseHandle
lstrlen
Sleep
GetACP
TerminateThread
SetLastError
ReleaseMutex
PulseEvent
GlobalUnlock
FindClose
LoadLibraryW
TlsGetValue
GetEnvironmentVariableA
user32
DispatchMessageA
CallWindowProcA
DrawEdge
GetDC
IsWindow
FillRect
DrawMenuBar
SetFocus
DefWindowProcW
GetIconInfo
CopyRect
GetDlgItem
CheckRadioButton
msasn1
ASN1BEREncEoid
ASN1BERDecNull
ASN1BERDecCheck
ASN1BEREncBool
ASN1BERDecBool
dpnet
DirectPlay8Create
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ