Static task
static1
Behavioral task
behavioral1
Sample
af573b8b17a90dd67a5403ff0456bdff0a5d85f7d456d8b2a6955c3041c16e9d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af573b8b17a90dd67a5403ff0456bdff0a5d85f7d456d8b2a6955c3041c16e9d.exe
Resource
win10v2004-20220812-en
General
-
Target
af573b8b17a90dd67a5403ff0456bdff0a5d85f7d456d8b2a6955c3041c16e9d
-
Size
370KB
-
MD5
b10297148b4077225888b043acf7db80
-
SHA1
41e075a3e023c99e9df98be9bf06fc79dd21c09a
-
SHA256
af573b8b17a90dd67a5403ff0456bdff0a5d85f7d456d8b2a6955c3041c16e9d
-
SHA512
f3f9796ccf35b22a78a9c7511ecd8c206fcb3a3ebd7dc77928bfc3f387eb7796ace6cc45676dffd8d633482b30f9e975934578b97ad494cd2fd0edae2b6cdc23
-
SSDEEP
6144:hQgm1aZCkx2o4sGmn8rv4DNpTaQzRmPQ8QiG8AKMEvxkNGkfnCJ49ijMXC:hQgFqon8rvgp49VMEZMfna49ijM
Malware Config
Signatures
Files
-
af573b8b17a90dd67a5403ff0456bdff0a5d85f7d456d8b2a6955c3041c16e9d.exe windows x86
74dbdaee5f8d586bfda493eeb5c11e1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntW
GetModuleHandleW
VirtualAlloc
GetMailslotInfo
GetExitCodeProcess
CreateFileW
LocalSize
CreateThread
LocalFree
ReadFile
CloseHandle
FindVolumeClose
GetDriveTypeW
lstrlenA
GlobalFree
GetProcessHeap
ReleaseMutex
FreeConsole
InterlockedExchange
ResetEvent
user32
GetMenu
CreateWindowExA
GetCursorInfo
GetSysColor
CallWindowProcA
SetFocus
GetClassInfoA
GetDlgItem
DrawStateW
DispatchMessageA
EndDialog
GetClientRect
GetKeyState
clbcatq
DllGetClassObject
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
ComPlusMigrate
desk.cpl
InstallScreenSaverA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 360KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ