Static task
static1
Behavioral task
behavioral1
Sample
5124422220867e7f4ac5e9831c241f2483cd120b0de5ec262b27e46a435e2baa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5124422220867e7f4ac5e9831c241f2483cd120b0de5ec262b27e46a435e2baa.exe
Resource
win10v2004-20220901-en
General
-
Target
5124422220867e7f4ac5e9831c241f2483cd120b0de5ec262b27e46a435e2baa
-
Size
144KB
-
MD5
eb506284bd8d3e6dba49fb1e192dc758
-
SHA1
6610a002b364d5ca5760e16087a06cf7a58a6127
-
SHA256
5124422220867e7f4ac5e9831c241f2483cd120b0de5ec262b27e46a435e2baa
-
SHA512
e87f82c3ae35ecdb9ee0f0138fcd04f1e820cc75090b71dbd13c45c96df2c2a17b96e801995ab728e126b63df722b077cad13bf9e37b9c1612e5bde8be8b0dd4
-
SSDEEP
3072:69s3NECpGSBdtpUOSeUT7etMOLhf/fSCm+DyALJSc1jXv3snww/U:Vbpv7tpNtUTieOZ/fSCCAtSc1jf3snvM
Malware Config
Signatures
Files
-
5124422220867e7f4ac5e9831c241f2483cd120b0de5ec262b27e46a435e2baa.exe windows x86
163ac8683d2948f38d7f2f71d4597713
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsGetValue
UnregisterWaitEx
CreateEventA
LoadLibraryExA
MoveFileExW
GetCommandLineA
SetSystemTime
DeleteFileA
GetStartupInfoA
EnumTimeFormatsA
GetConsoleTitleW
GetModuleHandleA
user32
InvalidateRect
CloseWindow
IsDialogMessageA
DrawIcon
GetWindow
DefWindowProcA
GetMenuCheckMarkDimensions
DrawStateW
GetClassNameW
msvcrt
_acmdln
__getmainargs
__setusermatherr
__set_app_type
_adjust_fdiv
exit
_exit
_initterm
__p__fmode
memcpy
_except_handler3
_XcptFilter
__p__commode
_controlfp
Sections
.text Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ