Static task
static1
Behavioral task
behavioral1
Sample
a05cf71b612da9295092f0572816ebb1f9316b58d6a03603c8a565a575b62390.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a05cf71b612da9295092f0572816ebb1f9316b58d6a03603c8a565a575b62390.exe
Resource
win10v2004-20221111-en
General
-
Target
a05cf71b612da9295092f0572816ebb1f9316b58d6a03603c8a565a575b62390
-
Size
26KB
-
MD5
7f6d210b8c1d75189a298107ce20fa32
-
SHA1
616a4670dbc3ee02e9ee73491ca1e095f168b391
-
SHA256
a05cf71b612da9295092f0572816ebb1f9316b58d6a03603c8a565a575b62390
-
SHA512
506ddb1eb8d63b83d266baf36f9bae128112a7b1e80e977d3ab6994b6b9fb02dcc6a9a3eda2098e3034ef15cc7904facee0860a5cafd1d04d32cd1783e896776
-
SSDEEP
384:XiLNydwMlIu8c/Z4grtOL5Rrjv6ufzVyrBYfiVwTkQgP:XiL0dl+GWgrevIrBiiVhP
Malware Config
Signatures
Files
-
a05cf71b612da9295092f0572816ebb1f9316b58d6a03603c8a565a575b62390.exe windows x86
bbeec381ef4fead399c53c0750caa1d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
GetConsoleMode
HeapCreate
CreateMutexA
GlobalUnlock
GetStdHandle
SetLastError
TerminateThread
TlsGetValue
lstrlenW
GetModuleHandleA
Sleep
GetCurrentThreadId
CloseHandle
FindResourceA
SetEnvironmentVariableA
PulseEvent
LocalFree
CreateFileA
ReleaseMutex
user32
CallWindowProcA
DrawMenuBar
DrawEdge
CopyRect
SetFocus
FillRect
GetDC
CheckRadioButton
GetIconInfo
DispatchMessageA
IsWindow
GetDlgItem
GetClipCursor
apphelp
SdbCloseDatabase
SdbGetDatabaseID
SdbFindFirstTag
ApphelpCheckIME
SdbFindNextTag
clbcatq
ComPlusMigrate
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE