Static task
static1
Behavioral task
behavioral1
Sample
345129c06773b1c77490b0ded241508872171a52b38f6440125b6ce676fb97e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
345129c06773b1c77490b0ded241508872171a52b38f6440125b6ce676fb97e4.exe
Resource
win10v2004-20220812-en
General
-
Target
345129c06773b1c77490b0ded241508872171a52b38f6440125b6ce676fb97e4
-
Size
359KB
-
MD5
a40c2a4ef04db0479c41338009858437
-
SHA1
25fe712686764914dbbc75fd92084e796ae0a497
-
SHA256
345129c06773b1c77490b0ded241508872171a52b38f6440125b6ce676fb97e4
-
SHA512
498213679fec9fc5f5f53f9fd94b07ce0a1b91bee8930c81786e50662c4a2cb83665fca4d531a165e794fd07f7f16546089a097b6435bd7382a56c368dd056bd
-
SSDEEP
6144:2hHxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVV2Ir:2hR9QI0Ay6fYvzEOe2KNSQ6l83zBzsu+
Malware Config
Signatures
Files
-
345129c06773b1c77490b0ded241508872171a52b38f6440125b6ce676fb97e4.exe windows x86
faafa06f883946f1effe978da1eab7a6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
GetModuleHandleW
GetTickCount
LoadLibraryA
HeapCreate
CreateFileA
LocalFree
lstrlenA
GetTickCount
GetDiskFreeSpaceW
GetSystemTime
FindAtomW
CloseHandle
GetFileAttributesA
ExitProcess
ReleaseMutex
ResetEvent
GetDriveTypeA
GetCommandLineW
GetComputerNameW
user32
GetMenu
EndDialog
DrawStateA
DispatchMessageA
CallWindowProcA
GetComboBoxInfo
FillRect
CloseWindow
CreateWindowExA
GetCaretPos
GetDlgItem
GetClassInfoA
DestroyCaret
rasapi32
RasDialA
DwRasUninitialize
RasDeleteEntryA
DwEnumEntryDetails
DwCloneEntry
modemui
CountryRunOnce
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ