Static task
static1
Behavioral task
behavioral1
Sample
b1b8ddd3a22d8eb464ee19ed50d86e805fc27111f2fa5523b896675c44f1f2c5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b1b8ddd3a22d8eb464ee19ed50d86e805fc27111f2fa5523b896675c44f1f2c5.exe
Resource
win10v2004-20220812-en
General
-
Target
b1b8ddd3a22d8eb464ee19ed50d86e805fc27111f2fa5523b896675c44f1f2c5
-
Size
80KB
-
MD5
415a6a686233323f85a919135daa104b
-
SHA1
5894fbe0072ff94379ba82d669b0d0e9362904a7
-
SHA256
b1b8ddd3a22d8eb464ee19ed50d86e805fc27111f2fa5523b896675c44f1f2c5
-
SHA512
c40df67ac9382bb29bfc1114c1a9257e1ab1f5c02bc16bcaa886ac45c932f218a5e61529d1f9400c5a7505483d921680fc2f92666512758222a6d63e9055272a
-
SSDEEP
1536:M/w8PfDhduhS8BsCx2dtb4iqYZq4p5ftWi:MNPfD/uk8BsCx2svszDftW
Malware Config
Signatures
Files
-
b1b8ddd3a22d8eb464ee19ed50d86e805fc27111f2fa5523b896675c44f1f2c5.exe windows x86
cb370a7f22b0ed9af6736b19a4ff6ead
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
CreateFileA
ReadFile
SetFilePointer
GetModuleFileNameA
lstrlen
GetTickCount
GetSystemTimeAsFileTime
CreateProcessA
GetTempPathA
GetFileAttributesA
SetFileAttributesA
VirtualFree
FreeLibrary
SetLastError
GetLastError
GetCurrentProcess
GetProcAddress
LoadLibraryA
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleA
TerminateProcess
VirtualAlloc
lstrcpy
lstrcat
GetSystemDirectoryA
user32
wsprintfA
GetCursorPos
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mackt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE