Static task
static1
Behavioral task
behavioral1
Sample
b58eaf30bb754415330f2d537650fcb7610bebec6084b173547014a8beb3eb1c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b58eaf30bb754415330f2d537650fcb7610bebec6084b173547014a8beb3eb1c.exe
Resource
win10v2004-20220812-en
General
-
Target
b58eaf30bb754415330f2d537650fcb7610bebec6084b173547014a8beb3eb1c
-
Size
503KB
-
MD5
5d0bfdc7ccfb9688acb90f6c205fbf30
-
SHA1
3aaee686dabbb6ef9ff3dc210d671b6dc6d5e2c7
-
SHA256
b58eaf30bb754415330f2d537650fcb7610bebec6084b173547014a8beb3eb1c
-
SHA512
4570d021e340fc5e5e95ea8b55df1418d14ec41981f9e139848f6f40d450e0d5aca99f3469bd9e08dc038694775fca503f7b563190d1afdf2b6da6cdc421323b
-
SSDEEP
12288:gonD6sOvA118sYCkwamja7bcZTrE5FC3elX/XICHMh:goD6sOv618ErQAsXvICHY
Malware Config
Signatures
Files
-
b58eaf30bb754415330f2d537650fcb7610bebec6084b173547014a8beb3eb1c.exe windows x86
558d1710189190a8628fddfd20389355
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
lstrcmpiA
CreateMailslotA
lstrcmpiA
lstrcmpiA
GetModuleHandleA
GetDriveTypeW
OpenMutexA
Sleep
CreateNamedPipeW
lstrlenA
FileTimeToLocalFileTime
GetModuleFileNameA
lstrcmpiA
GetLogicalDriveStringsW
SetLastError
GetVolumePathNameW
DeleteFileA
HeapCreate
WaitForMultipleObjects
lstrcmpiA
GetStdHandle
IsValidLocale
scecli
DeltaNotify
SceSysPrep
SceOpenPolicy
InitializeChangeNotify
Sections
.text Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.orpc Size: 3KB - Virtual size: 532KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 495KB - Virtual size: 495KB
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ