Static task
static1
Behavioral task
behavioral1
Sample
9871bd392fb895d80f1b25eb814611c70b7fc22d061044cf82d31f35562474c4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9871bd392fb895d80f1b25eb814611c70b7fc22d061044cf82d31f35562474c4.exe
Resource
win10v2004-20220812-en
General
-
Target
9871bd392fb895d80f1b25eb814611c70b7fc22d061044cf82d31f35562474c4
-
Size
305KB
-
MD5
590d30f6d34d8fd43535c4a0ae546f93
-
SHA1
45495737bf3d5ceb2a586c0674a8a7e464683562
-
SHA256
9871bd392fb895d80f1b25eb814611c70b7fc22d061044cf82d31f35562474c4
-
SHA512
02e17301cec14adcb03daf598acc83d876f48f5d0c090f5ad6f8d979c46cbcba0f50aa0efc68ac4ba3b1b03c846c290a97e48eeb3c09e9743832d970341c138d
-
SSDEEP
6144:Ebfl5sOOh58o5BgbN5I4Afi49R9OAOr3jZcwHTiD:EbDsOOAxfI4AfPrjOrTZcp
Malware Config
Signatures
Files
-
9871bd392fb895d80f1b25eb814611c70b7fc22d061044cf82d31f35562474c4.exe windows x86
db67111de3f430f0db863cf10b96729f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateMailslotA
GetFileAttributesA
EnumCalendarInfoW
SetLastError
SetEvent
lstrlenA
FindClose
GetConsoleAliasW
FindAtomW
HeapCreate
ResumeThread
LocalFree
GetCurrentProcessId
GetDriveTypeW
GetCurrentThreadId
GetPrivateProfileStringW
GetModuleHandleA
GetModuleFileNameA
EnterCriticalSection
user32
GetCursorInfo
DispatchMessageA
GetKeyboardType
GetSysColor
DrawTextW
GetKeyState
SetFocus
GetMenuInfo
GetClientRect
IsWindow
DispatchMessageA
GetClassInfoA
CallWindowProcW
admparse
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
IsAdmDirty
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ