Static task
static1
Behavioral task
behavioral1
Sample
c46ae5eeaf2faf61e101689f368f6823f4b1a3f7a5911c1caa209740131bebf6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c46ae5eeaf2faf61e101689f368f6823f4b1a3f7a5911c1caa209740131bebf6.exe
Resource
win10v2004-20220901-en
General
-
Target
c46ae5eeaf2faf61e101689f368f6823f4b1a3f7a5911c1caa209740131bebf6
-
Size
362KB
-
MD5
41b70368f923de7e0959422eb06766bc
-
SHA1
e95e04871f65ea6ded69c60d5790d3e9a3dd8530
-
SHA256
c46ae5eeaf2faf61e101689f368f6823f4b1a3f7a5911c1caa209740131bebf6
-
SHA512
9ce5c15c3c5d0bac9ade1d760c7d64035e2b63e18edd3231a089acbd9e9a6444fbb50290690bd65d62bfcaa36d3d84dc347e1047f86d0b01661c5f918443acf0
-
SSDEEP
6144:1znP2W+ffKbcd15Iiz3v4W4slrd0tRWH5ZjUZk0EXtabOocGSxRzvU:17P2hfyIdz7v4W4WdmYfSk1talFURjU
Malware Config
Signatures
Files
-
c46ae5eeaf2faf61e101689f368f6823f4b1a3f7a5911c1caa209740131bebf6.exe windows x86
bdbd3c56e9548dffe9c4fbf1900b3c3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
EnumResourceTypesA
GetComputerNameA
Sleep
FreeConsole
TlsGetValue
DeleteCriticalSection
GetLastError
GetTickCount
CloseHandle
ReleaseMutex
FindClose
GetModuleHandleA
GetVolumeInformationA
GetCommandLineA
SearchPathA
GetExitCodeProcess
GetDriveTypeA
VirtualProtect
SetLastError
shell32
DragAcceptFiles
SHGetSettings
SHAlloc
DragFinish
SHGetNewLinkInfo
SheChangeDirA
StrChrA
DragQueryPoint
SHGetDiskFreeSpaceA
SHFree
ShellMessageBoxA
SHGetMalloc
ShellAboutA
DragQueryFileA
glmf32
glsComment
glsAppRef
glsChannel
glsBinary
glsBlock
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ