Static task
static1
Behavioral task
behavioral1
Sample
b58631197f6856dff5ead94ff20b4131e62135cee429c3ed3654f63070a34e46.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b58631197f6856dff5ead94ff20b4131e62135cee429c3ed3654f63070a34e46.exe
Resource
win10v2004-20221111-en
General
-
Target
b58631197f6856dff5ead94ff20b4131e62135cee429c3ed3654f63070a34e46
-
Size
747KB
-
MD5
351cebbcdc39f98973524a8a781e539b
-
SHA1
a71becf15b53ae74ebeae6a68e76d61032c22d43
-
SHA256
b58631197f6856dff5ead94ff20b4131e62135cee429c3ed3654f63070a34e46
-
SHA512
5fa81e218f73b22aa25817ae0e337e3d337200933a52d066988f4c0018e7d6a4fd9da8b0f6cd1b27151d3eeee72373f41411d7b134017931a7c61d7fe81c550f
-
SSDEEP
12288:EC02NE078i9pjpgJ3RqAz/g5mf1ufgwGeH9tkkAugCH6ye/hnW2XF:EC3EkpAvz/mmkhhfAut6rxW2V
Malware Config
Signatures
Files
-
b58631197f6856dff5ead94ff20b4131e62135cee429c3ed3654f63070a34e46.exe windows x86
c3fe83d7ca73bc920de656067a9eac9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableW
ResetEvent
WaitForSingleObject
VirtualAllocEx
GetStdHandle
SetEvent
CreateMutexA
GetCommandLineW
ExitProcess
GetStartupInfoW
RemoveDirectoryA
SetLastError
GetFileAttributesA
CloseHandle
GetTickCount
CreateFileA
FindClose
HeapSize
OpenProcess
GetModuleHandleA
DeleteFileA
user32
GetWindowLongA
FillRect
GetDC
DispatchMessageW
GetSysColor
GetDC
FindWindowW
PeekMessageA
DispatchMessageW
GetDC
MessageBoxA
GetClassInfoA
CallWindowProcW
perfctrs
CloseNbfPerformanceData
CloseNbfPerformanceData
CloseNbfPerformanceData
CloseNbfPerformanceData
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 741KB - Virtual size: 740KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ