Static task
static1
Behavioral task
behavioral1
Sample
bbb24483c967d19fe3e5baabbe7dea15bd98c8879c32c53affd3a9c118ef9c05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bbb24483c967d19fe3e5baabbe7dea15bd98c8879c32c53affd3a9c118ef9c05.exe
Resource
win10v2004-20220901-en
General
-
Target
bbb24483c967d19fe3e5baabbe7dea15bd98c8879c32c53affd3a9c118ef9c05
-
Size
32KB
-
MD5
22b615bf24627f053e71df6f3e8b6392
-
SHA1
c4a06f3ed068d2f3e1bfa59553265d5c588c875b
-
SHA256
bbb24483c967d19fe3e5baabbe7dea15bd98c8879c32c53affd3a9c118ef9c05
-
SHA512
7f768635e540114bc4b0bf1c2e357d0dd46f3a16eb9d07911213b36b7dc45fdfb432d3214cf05fc42ddfd4d9aa6d28386c77a541a3a3047293b70450502d54d8
-
SSDEEP
192:gv2o4GreaoL8c1G7P1oynE+9pJKEDFhgm/1lHmTAZbebAtMGV18gg:22o4+epQ/D1i+9bfvgm/1lHmzTGf8
Malware Config
Signatures
Files
-
bbb24483c967d19fe3e5baabbe7dea15bd98c8879c32c53affd3a9c118ef9c05.exe windows x86
2de711cc410e1c08a8508e229c0d8f60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
msvcrt
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_acmdln
__p__fmode
_access
_except_handler3
_controlfp
exit
_XcptFilter
_exit
strchr
strlen
strcpy
strcat
fopen
fprintf
fclose
strrchr
memset
sprintf
__p__commode
__set_app_type
kernel32
GetModuleHandleA
GetStartupInfoA
CreateFileA
CloseHandle
GetFileTime
SetFileTime
GetWindowsDirectoryA
DeleteFileA
FindFirstFileA
CopyFileA
FindNextFileA
FindClose
GetModuleFileNameA
GetVersionExA
WinExec
Sleep
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE