Static task
static1
Behavioral task
behavioral1
Sample
bca4dd1b132aeaee7f70211266be3aeccb347d494186676aa2fed8713162bbe6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bca4dd1b132aeaee7f70211266be3aeccb347d494186676aa2fed8713162bbe6.exe
Resource
win10v2004-20220812-en
General
-
Target
bca4dd1b132aeaee7f70211266be3aeccb347d494186676aa2fed8713162bbe6
-
Size
305KB
-
MD5
43962fe3dc3187874149639c75a14937
-
SHA1
1494d3ae0ed37e922bad25dc207ddf74d38e090f
-
SHA256
bca4dd1b132aeaee7f70211266be3aeccb347d494186676aa2fed8713162bbe6
-
SHA512
61b8decf5ea05a033db888178128395e84d4333195b99f14b32bcb6d97426387259cd7475e868ea7a5f6368f14d54084cc25bc2ba59cbcb2891615d9ccaf73ee
-
SSDEEP
6144:+GNKy8rUdFAD6KULXdnsR8kElLlz+XEBl6n8XU9nxPiIKxm9:+GUy8gdG2jiQ+Y2pZivx
Malware Config
Signatures
Files
-
bca4dd1b132aeaee7f70211266be3aeccb347d494186676aa2fed8713162bbe6.exe windows x86
b4ef0bcc3429d188f30b7adcc2d03015
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
lstrlenA
FindAtomW
HeapCreate
GetCurrentThreadId
SetEvent
GetDriveTypeW
GetModuleFileNameA
GetFileAttributesA
EnumCalendarInfoW
ResumeThread
CreateMailslotA
GetConsoleAliasW
LocalFree
SetLastError
FindClose
GetCurrentProcessId
GetModuleHandleA
EnterCriticalSection
GetPrivateProfileStringW
user32
GetKeyboardType
GetKeyState
GetClassInfoA
DispatchMessageA
GetClientRect
IsWindow
GetCursorInfo
SetFocus
CallWindowProcW
DispatchMessageA
GetSysColor
GetMenuInfo
DrawTextW
admparse
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ