Static task
static1
Behavioral task
behavioral1
Sample
b4c2abcc04e5d3a44eca0898be8cf5b9277e51a2d51ae30c54b3d767f4d652a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4c2abcc04e5d3a44eca0898be8cf5b9277e51a2d51ae30c54b3d767f4d652a8.exe
Resource
win10v2004-20221111-en
General
-
Target
b4c2abcc04e5d3a44eca0898be8cf5b9277e51a2d51ae30c54b3d767f4d652a8
-
Size
290KB
-
MD5
33f40bfbdb510c71a8cddb5425a68f2e
-
SHA1
f16aeed2a6fe28d2de2457c31fce8615e1781a82
-
SHA256
b4c2abcc04e5d3a44eca0898be8cf5b9277e51a2d51ae30c54b3d767f4d652a8
-
SHA512
46a1dd821a9758320ed527134fa095cf74fccb0f1d1e110596bb5d429d7ba3aabf5e8e742d604b3424e9a704ce80d84d5db49a777678df4aeafa6652cc911813
-
SSDEEP
6144:nbrptm16+nJqid8yLTwxV4QyG6JVpdutSiSxnxD:nbrptmwq1dN+N6rpdOSiSxZ
Malware Config
Signatures
Files
-
b4c2abcc04e5d3a44eca0898be8cf5b9277e51a2d51ae30c54b3d767f4d652a8.exe windows x86
03d30f4d0edc6668cc2374075962a9e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
DeleteCriticalSection
UnhandledExceptionFilter
ReleaseSemaphore
CreateThread
IsDebuggerPresent
LeaveCriticalSection
VirtualProtectEx
ReadProcessMemory
ResumeThread
SetThreadPriority
OpenProcess
GetShortPathNameW
FreeLibrary
FindFirstFileW
EnterCriticalSection
GetSystemTime
WaitForSingleObject
GetDriveTypeW
GetSystemTimeAsFileTime
CreateFileW
FindClose
CreateDirectoryW
GetFileSize
CreateSemaphoreA
GetCurrentThreadId
SystemTimeToFileTime
SetUnhandledExceptionFilter
CloseHandle
FindNextFileW
GetExitCodeThread
VirtualAlloc
psapi
GetProcessMemoryInfo
ole32
CoCreateInstance
CoUninitialize
StgOpenStorageEx
CoInitializeEx
CoTaskMemFree
StgCreateStorageEx
CoInitialize
advapi32
RegCloseKey
RegOpenKeyExW
OpenProcessToken
userenv
GetUserProfileDirectoryW
esent
JetCreateIndex
JetDelete
JetUnregisterCallback
JetTerm2
JetCreateTableColumnIndex2
JetRestore
JetRegisterCallback
JetGetCurrentIndex
JetCreateInstance
JetEndExternalBackupInstance
JetCreateTable
JetPrepareToCommitTransaction
JetAttachDatabaseWithStreaming
msctfp
GetProxyDllInfo
DllGetClassObject
DllUnregisterServer
DllRegisterServer
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 260KB - Virtual size: 337KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ