Static task
static1
Behavioral task
behavioral1
Sample
55fd32578f24dd1c8c75beb6aca6c151ab9ab2400c9dbbc83d5354dbb58ac26c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
55fd32578f24dd1c8c75beb6aca6c151ab9ab2400c9dbbc83d5354dbb58ac26c.exe
Resource
win10v2004-20221111-en
General
-
Target
55fd32578f24dd1c8c75beb6aca6c151ab9ab2400c9dbbc83d5354dbb58ac26c
-
Size
99KB
-
MD5
32a15aa9c557559cdabfd7ce442e5960
-
SHA1
e05263a12c080b1446c37f4902693bb08d42a28a
-
SHA256
55fd32578f24dd1c8c75beb6aca6c151ab9ab2400c9dbbc83d5354dbb58ac26c
-
SHA512
9b99b22f9fadef58e4e47ba7164336e9d0adb3e31416bcfd10ee7470e744e424d9f35bdd08592a79e5c59780443ab109e5c95cf13adc36eef07933bfecbb774d
-
SSDEEP
768:KgALLPJo+BG/0tCygg+RkaqBLj/Xy2BlJq9stfNNN3Esm75yAinGMIeYuOjb1B3r:oJJ6RkbBLjfyelJ/NNN3+FFM2jjHIq
Malware Config
Signatures
Files
-
55fd32578f24dd1c8c75beb6aca6c151ab9ab2400c9dbbc83d5354dbb58ac26c.exe windows x86
3d35b6444d48f06bc5182f1d021b3152
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
PulseEvent
GetDriveTypeA
CloseHandle
DeleteFileA
lstrlenA
GetStartupInfoA
TlsAlloc
IsBadStringPtrW
DeviceIoControl
IsDebuggerPresent
GetCommandLineA
CreateFileMappingW
HeapDestroy
GetModuleFileNameW
ReleaseMutex
CloseHandle
GetModuleHandleA
Sleep
CreateFileA
user32
DestroyWindow
IsWindow
DispatchMessageA
CallWindowProcW
GetWindowLongA
GetIconInfo
DispatchMessageA
FindWindowW
PeekMessageA
DrawTextW
IsZoomed
DestroyMenu
LoadImageA
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE