Static task
static1
Behavioral task
behavioral1
Sample
95848ecf1a6b106c058e56b15cd7319237fd3b11a5b51b257c6ef3420430bcbb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
95848ecf1a6b106c058e56b15cd7319237fd3b11a5b51b257c6ef3420430bcbb.exe
Resource
win10v2004-20220901-en
General
-
Target
95848ecf1a6b106c058e56b15cd7319237fd3b11a5b51b257c6ef3420430bcbb
-
Size
362KB
-
MD5
d997c612e942ea611ea201a01c0f17e6
-
SHA1
c26f690a1062ef0546d6e705c83267133b3fc2cf
-
SHA256
95848ecf1a6b106c058e56b15cd7319237fd3b11a5b51b257c6ef3420430bcbb
-
SHA512
bcd46d40d3f4b905c600df7b36f2621b150d13d3efa6dd0e4e3bf2b903b18dda392fa02c3fea4ee08253c5dc09da95df567c47eb95b9b0b2447d421bc85cfac3
-
SSDEEP
6144:4eM+2bf0uz7tn4tiT/gk+/WLfmByIJvpwduxCazhXjNeNsN5:4eM+lO7qQz+OacIRpwqCayg5
Malware Config
Signatures
Files
-
95848ecf1a6b106c058e56b15cd7319237fd3b11a5b51b257c6ef3420430bcbb.exe windows x86
8c4ef9f4ad07644a581f9635f858c841
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
SetLastError
GetLastError
GetDriveTypeA
GetExitCodeProcess
GetTickCount
GetCommandLineA
Sleep
CreateMutexA
VirtualProtect
FindClose
GetModuleHandleA
LoadLibraryExW
FreeConsole
CloseHandle
GetDiskFreeSpaceExW
EnumResourceTypesA
DeleteCriticalSection
TlsGetValue
GetComputerNameA
shell32
ShellAboutA
DragQueryFileA
StrChrA
SHGetNewLinkInfo
ShellMessageBoxA
SheChangeDirA
SHGetDiskFreeSpaceA
SHGetMalloc
SHGetSettings
DragFinish
DragAcceptFiles
SHAlloc
SHFree
glmf32
glsAppRef
glsBinary
glsChannel
glsBlock
glsComment
user32
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ