Static task
static1
Behavioral task
behavioral1
Sample
452bc37fb3b14bbec1914bd9e87752462fb58971c7ea58ed09335e636aafe2df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
452bc37fb3b14bbec1914bd9e87752462fb58971c7ea58ed09335e636aafe2df.exe
Resource
win10v2004-20220812-en
General
-
Target
452bc37fb3b14bbec1914bd9e87752462fb58971c7ea58ed09335e636aafe2df
-
Size
297KB
-
MD5
1666d5d859df8bfc27259b989fb5c1b0
-
SHA1
b7abf9d1a1390f32aad5c133eaae70ec13f67905
-
SHA256
452bc37fb3b14bbec1914bd9e87752462fb58971c7ea58ed09335e636aafe2df
-
SHA512
3fcfdc05f664a9db0998e3afff4bd5f3a2dd43801701ef9935ad699b805f8903da3576187ffe7654cab02eefbdb5b16104f1b06bbe7494c30f5c6bded8f5faee
-
SSDEEP
6144:YtQPlXLW+0gJcmpoqRPryEIVICKvNLiQlYwfbMN/:YiPlXL6I3JFCKv9blXb2
Malware Config
Signatures
Files
-
452bc37fb3b14bbec1914bd9e87752462fb58971c7ea58ed09335e636aafe2df.exe windows x86
43434ad00bd2ea7fad7c1f313044c563
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
lstrcmpiA
Sleep
FileTimeToLocalFileTime
GetStdHandle
SuspendThread
DeleteFileA
GetLogicalDriveStringsA
WaitForSingleObject
lstrcmpiA
lstrcmpiA
CreateMailslotA
GetModuleFileNameA
lstrlenA
GetDriveTypeW
lstrcmpiA
GetVolumePathNameA
GetProcessHeap
HeapCreate
IsValidCodePage
GetModuleHandleA
CreateNamedPipeA
SetLastError
rasdlg
RasDialDlgA
RasEntryDlgA
RouterEntryDlgA
DwTerminalDlg
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 288KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rts Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ