Static task
static1
Behavioral task
behavioral1
Sample
856b72f5e49b3fac424b244a46a6cb111004ae5edc277961663ad8b3737fac34.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
856b72f5e49b3fac424b244a46a6cb111004ae5edc277961663ad8b3737fac34.exe
Resource
win10v2004-20221111-en
General
-
Target
856b72f5e49b3fac424b244a46a6cb111004ae5edc277961663ad8b3737fac34
-
Size
452KB
-
MD5
0e2c4e8b1514d2e174c7b93e63fda78b
-
SHA1
3150486a0b5fd9ec30fab6ce93f385299f33f46a
-
SHA256
856b72f5e49b3fac424b244a46a6cb111004ae5edc277961663ad8b3737fac34
-
SHA512
22efdfb668285e70f4985f0ee3c92f83289efc9294d79dd93f2df41183ee146fcfabc5bb9c7e5696e613edb9c53a9918c3a93acb4b3556b997c2a7d4880a6b2a
-
SSDEEP
12288:t3RXKRlnwiSm+xHSD71QKK1MieKbSUsJfclZwn+hRl1U6y0Qhf:VRXKpSKD71E1MieKDZg+hjyFhf
Malware Config
Signatures
Files
-
856b72f5e49b3fac424b244a46a6cb111004ae5edc277961663ad8b3737fac34.exe windows x86
50bc8a8a06bc6f2a71672034c85523d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
RemoveDirectoryA
HeapFree
CreateSemaphoreW
CloseHandle
WaitForMultipleObjects
AddAtomA
HeapCreate
DeleteAtom
WriteFile
GetDriveTypeW
FindClose
GetFileType
ExitThread
FindAtomA
ClearCommBreak
GetProcessHeap
GetCommandLineA
IsBadWritePtr
RemoveDirectoryA
SetEndOfFile
GetModuleHandleA
SetVolumeLabelA
CreatePipe
CreateDirectoryA
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 600KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 444KB - Virtual size: 444KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE