Static task
static1
Behavioral task
behavioral1
Sample
bbc0c9abbe5cf76c6a8e15a190fe8b980f54e035bcdfb8c317d449ff518be7fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbc0c9abbe5cf76c6a8e15a190fe8b980f54e035bcdfb8c317d449ff518be7fc.exe
Resource
win10v2004-20220812-en
General
-
Target
bbc0c9abbe5cf76c6a8e15a190fe8b980f54e035bcdfb8c317d449ff518be7fc
-
Size
135KB
-
MD5
ff9fc9314b18dcb95b3044b956f289ca
-
SHA1
35e2486d840f6273f80e9fa4f2c731de8fa3d86e
-
SHA256
bbc0c9abbe5cf76c6a8e15a190fe8b980f54e035bcdfb8c317d449ff518be7fc
-
SHA512
aa285dddd9870de74e1e851294d1aaaf92a94ca3982f8db6586646532c6463131ff9986d68e605d50f5691b01d0447336dc08c67ee5d685f6866e6b0137ecbda
-
SSDEEP
3072:I3Snr37pm5gM9WentZGCizP37mvTwAHb5xVBRp5:c75gynlKDob5xRp5
Malware Config
Signatures
Files
-
bbc0c9abbe5cf76c6a8e15a190fe8b980f54e035bcdfb8c317d449ff518be7fc.exe windows x86
e25da4ee565a7e6f4d49803223da92dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
CreateEventW
EnumCalendarInfoA
EnterCriticalSection
LocalFlags
GetCurrentThreadId
GetCurrentProcessId
LocalFree
FindClose
FindAtomA
GetModuleHandleA
TlsGetValue
lstrlenW
ReadFile
GetNumberFormatA
GetConsoleAliasA
SetLastError
GetDriveTypeW
GetPrivateProfileStringA
HeapCreate
user32
DrawTextA
SetFocus
DispatchMessageA
CallWindowProcW
DispatchMessageA
GetKeyState
GetMenuInfo
IsWindow
GetKeyboardType
GetClassInfoA
GetSysColor
GetClientRect
GetCursorInfo
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ