Static task
static1
Behavioral task
behavioral1
Sample
bac67b97cdc8abc2ea57103e63afbaa32136b6d6772a0b6f8d76fe2d198439c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bac67b97cdc8abc2ea57103e63afbaa32136b6d6772a0b6f8d76fe2d198439c7.exe
Resource
win10v2004-20220812-en
General
-
Target
bac67b97cdc8abc2ea57103e63afbaa32136b6d6772a0b6f8d76fe2d198439c7
-
Size
17KB
-
MD5
e5757a6d2b6812ae1aaea105a6abcfa8
-
SHA1
b01b141469a4b5be0c197f6086a1fe17e3336077
-
SHA256
bac67b97cdc8abc2ea57103e63afbaa32136b6d6772a0b6f8d76fe2d198439c7
-
SHA512
f66363806b73d9d96db123da2c5a4fd0cc9eac925e6390b9c22bb9d4534fa6a43218d86de57608294fcdc98e2bacf1b08406fee55fe1e0ac2ed558f7b2189e39
-
SSDEEP
192:6ciROLlMs7P+XQQgN1jr3zlaa+ZnmKhTzf5z9J5Rn:ewxMQ0gNVrInmID5z9J5Rn
Malware Config
Signatures
Files
-
bac67b97cdc8abc2ea57103e63afbaa32136b6d6772a0b6f8d76fe2d198439c7.exe windows x86
15843e6f54fdd8cebb3d29d967e63387
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetStdHandle
WaitForSingleObject
lstrlenA
HeapReAlloc
GetSystemDefaultLangID
GetVersion
CompareFileTime
VirtualProtect
SuspendThread
WaitForMultipleObjects
GetAtomNameA
HeapCreate
GetModuleHandleA
GetConsoleCP
GlobalUnlock
LoadLibraryExA
CloseHandle
InterlockedExchange
LocalSize
GetTickCount
gdi32
GetMetaRgn
Ellipse
Escape
CreateICA
BeginPath
FloodFill
GetStringBitmapA
EqualRgn
EngLineTo
GetFontData
GetRgnBox
GetMetaFileA
DeleteDC
GetTextColor
CreateFontA
AbortPath
EndPath
DeleteObject
CreatePalette
winmm
PlaySoundA
auxSetVolume
OpenDriver
CloseDriver
auxGetVolume
secur32
AddCredentialsA
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ