Static task
static1
Behavioral task
behavioral1
Sample
b126a8dbaa2ca75ab581277d4f9890c4146be0095be3887ae56b6a11e089cb55.exe
Resource
win7-20220812-en
General
-
Target
b126a8dbaa2ca75ab581277d4f9890c4146be0095be3887ae56b6a11e089cb55
-
Size
286KB
-
MD5
931f0ba4a7cfc3665c0a1e1da142ab65
-
SHA1
aa05cb2060a6696b9c8c1d40d610758172dd55f7
-
SHA256
b126a8dbaa2ca75ab581277d4f9890c4146be0095be3887ae56b6a11e089cb55
-
SHA512
e1566088b59d8a86f5fcc6e9e3da0a56ba003042cca95cc60ceec63b9073659e880c8f0c21e59f82501abaadf3a326049208a31a230382ae58b3bce78b65ad1e
-
SSDEEP
6144:fZvGCyOf2spskP/fVE+sS0fKuVqeY2zrsT:fZvJxf2se/S0ffLzr
Malware Config
Signatures
Files
-
b126a8dbaa2ca75ab581277d4f9890c4146be0095be3887ae56b6a11e089cb55.exe windows x86
dd7fc7df89e4771c69f8cec34b266ecc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
shell32
ShellExecuteA
Shell_NotifyIconA
oleacc
CreateStdAccessibleObject
shlwapi
StrRetToBSTR
UrlCreateFromPathW
PathCreateFromUrlW
PathRemoveFileSpecW
PathAppendW
PathIsRelativeW
PathFindExtensionW
StrCmpIW
UrlUnescapeW
PathCombineW
kernel32
GetModuleHandleW
GlobalFindAtomA
GetProcessHeap
GetStartupInfoA
GetCurrentThreadId
InterlockedExchange
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcess
GetTickCount
EnumResourceLanguagesW
GetLocaleInfoW
UnhandledExceptionFilter
LocalAlloc
GetPrivateProfileSectionA
GetCurrentProcessId
VirtualProtect
QueryPerformanceCounter
TerminateProcess
FoldStringW
IsDebuggerPresent
InterlockedCompareExchange
DeleteFileW
Sections
.text Size: 144KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ