Static task
static1
Behavioral task
behavioral1
Sample
4e5f67637bd330c7b208e388a897385f5faab39fd55a235d42410dad5357ecbe.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4e5f67637bd330c7b208e388a897385f5faab39fd55a235d42410dad5357ecbe.exe
Resource
win10v2004-20220812-en
General
-
Target
4e5f67637bd330c7b208e388a897385f5faab39fd55a235d42410dad5357ecbe
-
Size
64KB
-
MD5
103a687b247f0d9399d881e83dfda950
-
SHA1
8f2be0fe57112888ec0f9c1838020c70080c6be4
-
SHA256
4e5f67637bd330c7b208e388a897385f5faab39fd55a235d42410dad5357ecbe
-
SHA512
b2ad8bc5fe223741da77fd30ba7f241cb7d893f6c7383bd7406a01e0f5caf4472cf845cf7235db46f18bfa6a9e901555951dac99477a8c62e354d36c7aeb9efd
-
SSDEEP
768:GElyPqhWE0F2S1RHzhiMqFPJxjHib5ddEhXzud2f8TQvEPACw/In+bbbbfcJ+Jev:yVHqX4UxoTJqE+bbbbfcJQx+
Malware Config
Signatures
Files
-
4e5f67637bd330c7b208e388a897385f5faab39fd55a235d42410dad5357ecbe.exe windows x86
d03833991408087a9b089816f91f076c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeW
InterlockedExchange
FatalExit
CreateSemaphoreW
GetACP
CreateMailslotA
GetProcessHeap
DeleteFileA
VirtualAlloc
DeleteFileA
CreatePipe
InitializeCriticalSection
DeleteFileA
GetModuleHandleA
SetVolumeLabelA
GetConsoleAliasA
WriteConsoleW
GetShortPathNameA
SetEnvironmentVariableA
CreateFileMappingW
SetCurrentDirectoryA
GetModuleHandleW
DeviceIoControl
mshtml
ShowModalDialog
ShowHTMLDialog
DllEnumClassObjects
ShowModelessHTMLDialog
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rrs Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avdr Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ