Static task
static1
Behavioral task
behavioral1
Sample
b761dc4cb41e90d22d57a721f71b3f4efa939d4c0ca9cf9c8caf41f6a703149d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b761dc4cb41e90d22d57a721f71b3f4efa939d4c0ca9cf9c8caf41f6a703149d.exe
Resource
win10v2004-20220812-en
General
-
Target
b761dc4cb41e90d22d57a721f71b3f4efa939d4c0ca9cf9c8caf41f6a703149d
-
Size
296KB
-
MD5
0e88253a6e357c2897bc9318aaa25f80
-
SHA1
8e71d89ad77cdf9b8debe51b89b0b3e8170b8aa0
-
SHA256
b761dc4cb41e90d22d57a721f71b3f4efa939d4c0ca9cf9c8caf41f6a703149d
-
SHA512
0a6861962393edf05bdf2b8d3c425c20358e0335e9bfae5adace5ce067ac33383fb8d85a6e76ca829a3a09e8bb21158eae3cf6ff0280bf98e86c18fee5c01ed6
-
SSDEEP
6144:0U7eH4vkulQz/6D7fuVILFDZ3vAWQiGrV0kmeMPMTBgSrQlNVibt1XJZ:NeH4jlskCIFFfoiGrVZZBcV4
Malware Config
Signatures
Files
-
b761dc4cb41e90d22d57a721f71b3f4efa939d4c0ca9cf9c8caf41f6a703149d.exe windows x86
6ce5c2fcf0022d2dfd24308507b063d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetPrivateProfileIntA
GetDiskFreeSpaceW
LoadLibraryA
lstrcmpA
GetExitCodeProcess
InterlockedIncrement
HeapCreate
WaitForSingleObject
ExitThread
GetModuleHandleW
GetStringTypeW
SetEnvironmentVariableA
CloseHandle
lstrcpyW
GetCurrentDirectoryA
GetDiskFreeSpaceW
GetLastError
InterlockedDecrement
FindResourceW
ReadFileEx
Heap32First
adsldpc
ADsExecuteSearch
ADsCloseSearchHandle
ADsDeleteClassDefinition
ADsEnumAttributes
clbcatq
SetupOpen
ComPlusMigrate
CheckMemoryGates
CheckMemoryGates
DllGetClassObject
SetSetupSave
ComPlusMigrate
CheckMemoryGates
SetSetupSave
DllGetClassObject
ComPlusMigrate
SetupOpen
SetupOpen
version
VerFindFileA
Sections
.text Size: 1024B - Virtual size: 816B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ