Static task
static1
Behavioral task
behavioral1
Sample
30d10554260d3f1d9b397327424adb314ebfff2ad95f2a6e0fd7fc21892275b7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
30d10554260d3f1d9b397327424adb314ebfff2ad95f2a6e0fd7fc21892275b7.exe
Resource
win10v2004-20221111-en
General
-
Target
30d10554260d3f1d9b397327424adb314ebfff2ad95f2a6e0fd7fc21892275b7
-
Size
746KB
-
MD5
fc1d6c5bfb2a8dddd25f7fdaad84e065
-
SHA1
b9feff3b0503a94d7fb623db42cdf22da2be0809
-
SHA256
30d10554260d3f1d9b397327424adb314ebfff2ad95f2a6e0fd7fc21892275b7
-
SHA512
0c8d63a40552a2b3410558506b16e84d9d5391d86bb675921daa9c1875284ba5b095e0bf560571c65fa44f9e65a095c76f4faf496176edeecc3f8e3f7921a2ae
-
SSDEEP
12288:4JoOcYnbApCOV1fFHZtcmOx+7XXmXOWUnkBtUtAiFc65bdAeqR:4dRbWF52x+7nmXVUKiAbybddq
Malware Config
Signatures
Files
-
30d10554260d3f1d9b397327424adb314ebfff2ad95f2a6e0fd7fc21892275b7.exe windows x86
d903a4f1a4dd0b347e10c49deec4c900
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
CreateFileA
CloseHandle
GetCommandLineW
GetTickCount
GetModuleHandleA
ResetEvent
WaitForSingleObject
ExitProcess
RemoveDirectoryA
FindClose
GetStdHandle
GetFileAttributesA
CreateMutexA
SetLastError
SetEvent
GetStartupInfoW
DeleteFileA
GetEnvironmentVariableW
OpenProcess
HeapSize
user32
FindWindowW
PeekMessageA
GetClassInfoA
GetDC
DispatchMessageW
CallWindowProcW
GetDC
FillRect
GetSysColor
DispatchMessageW
GetWindowLongA
GetDC
MessageBoxA
mfcsubs
??$HashKey@PBD@@YGIPBD@Z
??$HashKey@PBD@@YGIPBD@Z
??$HashKey@PBD@@YGIPBD@Z
??$HashKey@PBD@@YGIPBD@Z
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 740KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ