Static task
static1
Behavioral task
behavioral1
Sample
a51951f690478f0833d0e0b18330a0617840ee5ad6c8cf67d1da3ba1567d7463.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a51951f690478f0833d0e0b18330a0617840ee5ad6c8cf67d1da3ba1567d7463.exe
Resource
win10v2004-20221111-en
General
-
Target
a51951f690478f0833d0e0b18330a0617840ee5ad6c8cf67d1da3ba1567d7463
-
Size
87KB
-
MD5
77d68db34af0e0926410c584adc76559
-
SHA1
d666b465a68dbf52d0514272b479d0fb34d74dc7
-
SHA256
a51951f690478f0833d0e0b18330a0617840ee5ad6c8cf67d1da3ba1567d7463
-
SHA512
ff193a9f2737c07b1e324bdb7ba2931daefb328e1b2d156cc22bafba8480b0293bbe3f5c66af9b917785fa2bb08b72eb93619faeccd4ee6fa2729e64a54074d5
-
SSDEEP
1536:BiBRacH1qMpvtGHUcip/Z5MXosa0G9I+2ZVdygMWLlW9l3q2EEvVQ:BivH8Mp6JkR8a0Gu+wdWh9Rq2+
Malware Config
Signatures
Files
-
a51951f690478f0833d0e0b18330a0617840ee5ad6c8cf67d1da3ba1567d7463.exe windows x86
20e0787132fad4dcb48200d3925d5da5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleOutputCharacterA
GetTimeFormatW
GlobalAddAtomA
FreeEnvironmentStringsA
GetConsoleAliasesLengthA
CreateFileMappingW
GetEnvironmentVariableA
GetVersionExW
SetConsoleInputExeNameW
user32
DdeCreateStringHandleA
GetClipboardFormatNameW
SendMessageTimeoutW
CreateDialogIndirectParamA
wsprintfA
IsCharAlphaA
GetClassInfoA
PostThreadMessageW
gdi32
CreateFontIndirectExA
CreateFontIndirectExA
ResetDCA
Sections
.text Size: 42KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.share Size: 1024B - Virtual size: 882B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 731B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ