Static task
static1
Behavioral task
behavioral1
Sample
b4bb815304e40d277c48c72b7d72625a46edc04c31ec512fbbb1598b77c3f192.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4bb815304e40d277c48c72b7d72625a46edc04c31ec512fbbb1598b77c3f192.exe
Resource
win10v2004-20220901-en
General
-
Target
b4bb815304e40d277c48c72b7d72625a46edc04c31ec512fbbb1598b77c3f192
-
Size
160KB
-
MD5
5affc2d6dcbf81501e31ee9c96f56066
-
SHA1
fd0a3928fa8da5c2904b12221c1339a81ef5ad82
-
SHA256
b4bb815304e40d277c48c72b7d72625a46edc04c31ec512fbbb1598b77c3f192
-
SHA512
0454b377802cba5d1de1e60ff4d78ad63ffa71599ef2cfcc26208bf0ffceddb3663931857ab9a1eecc1d13fb301f5b7517fb5fcd017ce22105cc7f16ce0bb3a4
-
SSDEEP
3072:NQEWJC4velYsRB4NEpSri4k8iAumfc0/7ON7wJLG886gVMFT7n:NQNJcGyC2Cy8fumy5UGR6go/n
Malware Config
Signatures
Files
-
b4bb815304e40d277c48c72b7d72625a46edc04c31ec512fbbb1598b77c3f192.exe windows x86
f37f1cd0c96fa325001c2ac7e30ad7e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
lstrlenA
CloseHandle
CreateFileW
LocalSize
GetMailslotInfo
LocalFree
FindVolumeClose
ReleaseMutex
InterlockedExchange
GetCurrentThreadId
GetPrivateProfileIntW
GetDriveTypeW
GlobalFree
FreeConsole
VirtualAlloc
GetModuleHandleW
ResetEvent
GetExitCodeProcess
ReadFile
user32
IsIconic
DispatchMessageA
CreateWindowExA
GetSysColor
GetDlgItem
SetFocus
GetClientRect
DrawStateW
GetMenu
CallWindowProcW
GetClassInfoA
GetCursorInfo
EndDialog
dsprop
CheckADsError
CheckADsError
ReportError
CheckADsError
CheckADsError
desk.cpl
InstallScreenSaverW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ