Static task
static1
Behavioral task
behavioral1
Sample
b40eedbf664d3cee25dc12716c9d9f39133d4eacd24453cbf36e329bc3bfaefc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b40eedbf664d3cee25dc12716c9d9f39133d4eacd24453cbf36e329bc3bfaefc.exe
Resource
win10v2004-20221111-en
General
-
Target
b40eedbf664d3cee25dc12716c9d9f39133d4eacd24453cbf36e329bc3bfaefc
-
Size
299KB
-
MD5
af789875218288ead53317f6d5f35936
-
SHA1
b9860bfd35b141dc7032f7886ea40fc99e227d71
-
SHA256
b40eedbf664d3cee25dc12716c9d9f39133d4eacd24453cbf36e329bc3bfaefc
-
SHA512
781e036ce424a982358edb3fd19a79bd48b2410b206e5a73254ddb4253bd18a9902c1d343552a0148cc341a45cae8ec71e1978b10d29a1491feb958fa3fb70d9
-
SSDEEP
6144:qALvXcLds56lFkeXnUeFr9mKwU2QlJUoa6NTFoWFWr+sS38:JAdfFk/qr9mKlra2Td
Malware Config
Signatures
Files
-
b40eedbf664d3cee25dc12716c9d9f39133d4eacd24453cbf36e329bc3bfaefc.exe windows x86
2583b3ef1e2d4d4f61707172ec0aacf5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
lstrlenA
GetModuleHandleA
LoadLibraryA
CreateFileA
GetTickCount
GetFileAttributesA
GetComputerNameA
LocalFree
GetDriveTypeA
FindAtomA
GetSystemTime
GetCommandLineW
GetPrivateProfileStructW
ResetEvent
CloseHandle
CreateThread
HeapCreate
SetLastError
GetDiskFreeSpaceA
advapi32
GetFileSecurityW
IsTokenUntrusted
GetUserNameA
GetLengthSid
FreeSid
RegEnumKeyExA
RegQueryValueA
RegCreateKeyExA
RegCloseKey
CreateServiceA
CloseEventLog
RegEnumValueA
RegDeleteKeyA
clbcatq
CheckMemoryGates
SetSetupSave
SetupOpen
DllGetClassObject
ComPlusMigrate
user32
MessageBoxA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ