Static task
static1
Behavioral task
behavioral1
Sample
b4c45dd9023b6e680cea6212e5e8adeab9b8f7615944839ac9d214f8549c095b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4c45dd9023b6e680cea6212e5e8adeab9b8f7615944839ac9d214f8549c095b.exe
Resource
win10v2004-20220901-en
General
-
Target
b4c45dd9023b6e680cea6212e5e8adeab9b8f7615944839ac9d214f8549c095b
-
Size
676KB
-
MD5
166e61c13baa9cd73780f892f296fe70
-
SHA1
6badb8af7269e695f757516bc929eaf22710f778
-
SHA256
b4c45dd9023b6e680cea6212e5e8adeab9b8f7615944839ac9d214f8549c095b
-
SHA512
1aa1eefe241f7d76ec34bd15ca10031c7dd56cf0b5371828a98dfed5646ad9d99ee65239a7122c33f343a38837f8f0f61999e6b24e22adc5398a49e243f156d5
-
SSDEEP
12288:reJD52x9oewr/Yb08pSHeqNAMh1TI/bCw24FPp7r24dhkHR3y:reT2x9oeCi0D+GF1ZwbH7SfHd
Malware Config
Signatures
Files
-
b4c45dd9023b6e680cea6212e5e8adeab9b8f7615944839ac9d214f8549c095b.exe windows x86
536e7b5e6df1f475d688cec500810550
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
WriteFile
ResumeThread
ReadFile
GetThreadPriority
LoadLibraryA
VirtualAlloc
GetFileSize
GetModuleHandleA
WaitForSingleObject
VirtualQuery
GetTickCount
GetProcAddress
Sleep
GetSystemInfo
VirtualProtect
SetStdHandle
ExitProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsBadWritePtr
IsBadReadPtr
HeapValidate
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetModuleFileNameA
RtlUnwind
QueryPerformanceCounter
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
HeapFree
VirtualFree
InitializeCriticalSection
HeapAlloc
HeapReAlloc
GetACP
GetOEMCP
GetCPInfo
FlushFileBuffers
SetFilePointer
RaiseException
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CloseHandle
user32
SetFocus
wsprintfA
LoadImageA
DestroyWindow
gdi32
SelectObject
CreatePen
winmm
mciSendCommandA
auxSetVolume
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.EPV Size: 4KB - Virtual size: 597B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 400KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ