Static task
static1
Behavioral task
behavioral1
Sample
b78648359506c93d03ecfa0a4a4c8bd8e4dcd8871d9f7dd6d66de50eeed73159.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b78648359506c93d03ecfa0a4a4c8bd8e4dcd8871d9f7dd6d66de50eeed73159.exe
Resource
win10v2004-20220901-en
General
-
Target
b78648359506c93d03ecfa0a4a4c8bd8e4dcd8871d9f7dd6d66de50eeed73159
-
Size
274KB
-
MD5
b6ffcf23a79d2203cf7e15b623953090
-
SHA1
cfd5dfacc825ff75fa77e4add2e57b4c516482e1
-
SHA256
b78648359506c93d03ecfa0a4a4c8bd8e4dcd8871d9f7dd6d66de50eeed73159
-
SHA512
fb905727ca0091ab799593d4f882105b009a782596144e8ec2c22cf29f088f58ba4eaae85cba010de6370ea4cf2409ec58024a687b748b3b1b522bc0952b39ff
-
SSDEEP
6144:uX4zlaf9N8x+Cyf4KBlc+/Xy3exLvqM4f:uV5f4ihQw7qM
Malware Config
Signatures
Files
-
b78648359506c93d03ecfa0a4a4c8bd8e4dcd8871d9f7dd6d66de50eeed73159.exe windows x86
eba3c128ed8a2c768a27b9923d42a285
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CompareStringA
CreateEventA
CreateThread
EnterCriticalSection
ExitThread
FreeLibrary
GetComputerNameA
GetCurrentProcessId
GetTickCount
GlobalAlloc
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LocalFree
SetEvent
Sleep
UnmapViewOfFile
WaitForSingleObject
WriteConsoleA
lstrcmpiA
lstrcpynA
lstrlenA
user32
DestroyWindow
GetClassNameW
GetKeyState
GetLastActivePopup
GetMenuState
IsRectEmpty
PeekMessageW
RemovePropW
SendNotifyMessageW
SubtractRect
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 260KB - Virtual size: 262KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ