Static task
static1
Behavioral task
behavioral1
Sample
b01bae4cf27b6025c64c2decb0b397c6b8f7f1126f1d028c301f50d7d0483081.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b01bae4cf27b6025c64c2decb0b397c6b8f7f1126f1d028c301f50d7d0483081.exe
Resource
win10v2004-20221111-en
General
-
Target
b01bae4cf27b6025c64c2decb0b397c6b8f7f1126f1d028c301f50d7d0483081
-
Size
360KB
-
MD5
602b54c2fe6dfd41ce981801050127bf
-
SHA1
141d7df181909c0541fe9d2b73be17f26b8da648
-
SHA256
b01bae4cf27b6025c64c2decb0b397c6b8f7f1126f1d028c301f50d7d0483081
-
SHA512
f9b927efd800dd195444fdc50a5c5ca047bad20682f9209f6aea81941a476bf3bac019dd920836a805da4c2a57bf82c0bbbd14955882f34a79fd517f36a2f2d8
-
SSDEEP
6144:XwdjCwLkczmFsRG3WngHlWDEN/VO2Gji9XD0JpgnmckR3bvGcGTf4OEpa5L:XwdjlmHWD8/g299T0Pgm13bvGcwAVpa
Malware Config
Signatures
Files
-
b01bae4cf27b6025c64c2decb0b397c6b8f7f1126f1d028c301f50d7d0483081.exe windows x86
12fa8031ff4bc9a38828d352ac14a2e8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExA
GetModuleHandleA
FindVolumeClose
SearchPathA
ReleaseMutex
Sleep
GetTickCount
CloseHandle
CreateMutexA
GetLastError
GetSystemInfo
SetEvent
CreateThread
TlsGetValue
lstrlenA
VirtualProtect
GetCalendarInfoA
FindClose
FindAtomA
DeleteCriticalSection
user32
EnableWindow
GetUpdateRect
CloseWindow
CopyImage
GetScrollBarInfo
GetKeyState
DragDetect
GetMessageA
DialogBoxParamA
CreateWindowExA
DispatchMessageA
CreateMenu
EndDialog
IsIconic
msdtcuiu
DtcPerfOpen
DllRegisterServer
DtcPerfCollect
DtcPerfClose
DllGetClassObject
advapi32
RegCloseKey
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ