Static task
static1
Behavioral task
behavioral1
Sample
b7ba2a4624d6dd6f394e130c94909cb1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b7ba2a4624d6dd6f394e130c94909cb1.exe
Resource
win10v2004-20230221-en
General
-
Target
b7ba2a4624d6dd6f394e130c94909cb1.exe
-
Size
2.4MB
-
MD5
b7ba2a4624d6dd6f394e130c94909cb1
-
SHA1
cf01f00501383251913befe6654d539a2a2eb5eb
-
SHA256
0767e2998b5b2689329b98a76f6c0c9e663c4abf1ae0cc3d7b9b7dca7bc73b4d
-
SHA512
29f7c3c05c7958933e4b3cf17f371e6f0f3657657175099ec8a11430ef0380e7979b215bc4d3c319329386af33c5bafac8a6c5b11eefb81b8f953758b83617ff
-
SSDEEP
49152:lIgWNeRbjmYOfaCx6tFq8URNl8NdbQj9aAz97lEZn1KvM91bT+3JY:mg4oNOfac8+4db89z97mZ1KvMrb6e
Malware Config
Signatures
Files
-
b7ba2a4624d6dd6f394e130c94909cb1.exe.exe windows x86
d5d9d937853db8b666bd4b525813d7bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindFileNameA
kernel32
LockResource
lstrlenA
CloseHandle
CreateFileA
ExitProcess
FindResourceA
FreeResource
GetCommandLineA
GetEnvironmentVariableA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
LoadLibraryA
LoadResource
lstrcpynA
RtlMoveMemory
SetFileAttributesA
SizeofResource
WriteFile
lstrcatA
lstrcpyA
user32
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetMessageA
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE