Static task
static1
Behavioral task
behavioral1
Sample
f5cea467491be0ccc885544d3d2f93fdf262a1a0056e44ed22259a805acee791.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5cea467491be0ccc885544d3d2f93fdf262a1a0056e44ed22259a805acee791.exe
Resource
win10v2004-20221111-en
General
-
Target
f5cea467491be0ccc885544d3d2f93fdf262a1a0056e44ed22259a805acee791
-
Size
52KB
-
MD5
b6370d3446e34cb40f923247aa8d0620
-
SHA1
30152eb10f54722fb2b4a61fd6998a59ed3e92aa
-
SHA256
f5cea467491be0ccc885544d3d2f93fdf262a1a0056e44ed22259a805acee791
-
SHA512
48a5962f2c6ff890b92364c24d5415d020dba1323188221c233f2de88977bf1884fc9d4aa1ffd86f1380f11094af42304a2ed853b34f5b741958b84242b68235
-
SSDEEP
384:+AyOCtCEOSt9MNeLNek+vDRF/q3lR3Q3NQx4ui+nWXmEhBB:xyO6CStqi73QdQx4BB
Malware Config
Signatures
Files
-
f5cea467491be0ccc885544d3d2f93fdf262a1a0056e44ed22259a805acee791.exe windows x86
546ba049728ac891e57ad5f15c0d7a08
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
ReleaseMutex
PulseEvent
HeapDestroy
SearchPathA
CreateThread
ExitProcess
TlsGetValue
SetEvent
AddAtomA
GetDiskFreeSpaceA
GetLastError
lstrcmpiA
DeleteCriticalSection
GetComputerNameA
VirtualProtect
GetModuleHandleA
Sleep
CloseHandle
ResumeThread
user32
IsIconic
DialogBoxParamA
EndDialog
CopyIcon
CreateWindowExA
GetScrollBarInfo
DispatchMessageA
GetMessageA
GetKeyState
CopyImage
CloseWindow
EnableWindow
CreateMenu
DragDetect
hlink
HlinkResolveShortcut
HlinkClone
HlinkNavigate
HlinkTranslateURL
HlinkIsShortcut
shell32
DragQueryFileA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE