Static task
static1
Behavioral task
behavioral1
Sample
c255abd378f384eddb6f7616b38c600e7d689277968162e4e721da5e1d53c06e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c255abd378f384eddb6f7616b38c600e7d689277968162e4e721da5e1d53c06e.exe
Resource
win10v2004-20220812-en
General
-
Target
c255abd378f384eddb6f7616b38c600e7d689277968162e4e721da5e1d53c06e
-
Size
305KB
-
MD5
4633df791fc5fa38469fb8dc1d1687fd
-
SHA1
aa47594a55ba9e0de35f56c6383de7f17b8e8b61
-
SHA256
c255abd378f384eddb6f7616b38c600e7d689277968162e4e721da5e1d53c06e
-
SHA512
b2ebabadee1c67f58e4d5977c9c17f65b0b160a9e5379992ceb5517242f3b6720b1e0bc9e9ece7946da8b46f7548db46939ce1a12a06bd40c9543b67252b9a46
-
SSDEEP
6144:qfV+mymkFZtTh7WEUUVr+Os3pxfZSacuUX5AyioYqPv:YVcZ7Th7rPVopxfZSaczZiVq
Malware Config
Signatures
Files
-
c255abd378f384eddb6f7616b38c600e7d689277968162e4e721da5e1d53c06e.exe windows x86
1c340440d624b20ec27448daafe7b844
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetStartupInfoW
CloseHandle
ExitProcess
ResetEvent
CreateFileA
GetTickCount
GetCurrentDirectoryA
DeleteFileA
GetFileSize
FindClose
GetEnvironmentVariableA
AddAtomA
GetModuleHandleA
ReleaseMutex
CreateMutexW
WaitForSingleObject
SetEndOfFile
HeapDestroy
HeapCreate
HeapSize
SuspendThread
InitializeCriticalSection
SetLastError
GetProfileIntW
user32
PeekMessageA
GetWindowLongA
GetClassInfoA
CallWindowProcW
GetSysColor
GetDC
DispatchMessageW
GetDC
GetDC
GetCursorPos
MessageBoxA
GetDC
DispatchMessageW
dpmodemx
SPInit
SPInit
SPInit
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ