Static task
static1
Behavioral task
behavioral1
Sample
b374262c5659d2e424473beca0f2f6b5e3e7a4d995eb631919d38660a5ee3495.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b374262c5659d2e424473beca0f2f6b5e3e7a4d995eb631919d38660a5ee3495.exe
Resource
win10v2004-20220812-en
General
-
Target
b374262c5659d2e424473beca0f2f6b5e3e7a4d995eb631919d38660a5ee3495
-
Size
40KB
-
MD5
eb535fcac237634f70421115acc07042
-
SHA1
d99f5e3d3a11e0eadf2a9cefbea06f834b870023
-
SHA256
b374262c5659d2e424473beca0f2f6b5e3e7a4d995eb631919d38660a5ee3495
-
SHA512
664f1ecdc72523c850c1887ea61fcdcc7438ddb9c23fee2128052d30edbbdf463daf818e1a2599108fa168ccaf5bd8d0baf61cbd2227a34cf7c8a1bba8ebba4d
-
SSDEEP
768:43iX5BIOl7VbQORz0sS86xycY0vOzXhIhKVqm28krDJGbpOwn5t6x87JzaFpdJjV:uiX5BVJbhDpc4tgm6/JGkItrVOFpjV
Malware Config
Signatures
Files
-
b374262c5659d2e424473beca0f2f6b5e3e7a4d995eb631919d38660a5ee3495.exe windows x86
de624a73fba1606905ad2a58b18583c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
SetEvent
GetTickCount
CloseHandle
GetComputerNameW
FindVolumeClose
lstrlenA
ReleaseMutex
ReadFile
ExitThread
GetDriveTypeA
CreateFileW
GetModuleHandleW
LocalFree
GlobalFree
GlobalSize
GetExitCodeProcess
FreeConsole
GetPrivateProfileIntW
GetLocalTime
user32
EndDialog
GetSysColor
SetFocus
GetClientRect
GetKeyState
GetClassInfoA
GetCursorInfo
CallWindowProcA
DispatchMessageA
CreateWindowExA
GetMenu
DrawStateW
GetDlgItem
clbcatq
ComPlusMigrate
ComPlusMigrate
DllGetClassObject
ComPlusMigrate
ComPlusMigrate
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ