Static task
static1
Behavioral task
behavioral1
Sample
b74664917518d7a6a41cf1d5d885d47ee0d4e005d6323c92971d8861d615706e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b74664917518d7a6a41cf1d5d885d47ee0d4e005d6323c92971d8861d615706e.exe
Resource
win10v2004-20220901-en
General
-
Target
b74664917518d7a6a41cf1d5d885d47ee0d4e005d6323c92971d8861d615706e
-
Size
159KB
-
MD5
13c91a30294b15c645d5bc0005ec800b
-
SHA1
12263a4497d89cb2792d1130587f60c384cf8102
-
SHA256
b74664917518d7a6a41cf1d5d885d47ee0d4e005d6323c92971d8861d615706e
-
SHA512
5349d8d85e8b1e254f1e31c7a6d09ac7638028ce7702bcdbab54839e485e625a008b6b62861be5de9e07265cd736566f357c1efba3b8d03b75251e57038c6a65
-
SSDEEP
3072:Cl25HrbvldJi+kenCyDO6MW6WPMpk3d8vFYcq24ALXPj+8cpXCqk:Cl25HfvldJfpqZwuSydYcq2ZjqXC
Malware Config
Signatures
Files
-
b74664917518d7a6a41cf1d5d885d47ee0d4e005d6323c92971d8861d615706e.exe windows x86
e6535ae5e31a6fad5e14ad93130df8bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
FindClose
TlsGetValue
GetTickCount
CloseHandle
GetCommandLineA
GetComputerNameA
Sleep
GetLastError
GetExitCodeProcess
GetModuleHandleA
SearchPathA
GetDriveTypeA
CreateSemaphoreA
GetModuleFileNameA
DeleteCriticalSection
SetLastError
CreateMutexA
VirtualProtect
FreeConsole
shell32
SHGetMalloc
DragAcceptFiles
StrChrA
ShellAboutA
ShellMessageBoxA
DragQueryPoint
SHGetDiskFreeSpaceA
DragQueryFileA
SHFree
SHAlloc
DragFinish
SheChangeDirA
SHGetSettings
SHGetNewLinkInfo
mgmtapi
SnmpMgrRequest
SnmpMgrClose
SnmpMgrOpen
SnmpMgrGetTrap
SnmpMgrCtl
advapi32
RegCloseKey
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ