Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp
-
Size
9KB
-
MD5
4e11e864d2905c52337f3ceaeab075e8
-
SHA1
bcbf826be1c183bb9cc4d6c1cbff55a64c2dda26
-
SHA256
bad8f4ce55f2754da73c68104f8bf347bd20a37061052da57f55433cc0cadc43
-
SHA512
4dc291e9b5bfac84cf95f37ac18c5d589c1094dbe92e90b8b4365eec3acf9c8159852280572d8af24c795e7ed933f227a5d9f0a2ef97324448c7cd15e45fd9d1
-
SSDEEP
96:0y/dnSAFAXBdAZtEi3ZoN8jFhmCdRylV7lgjiizLrmEGxSSd:PLGdArEiJoCF0Cdsf7lsa
Malware Config
Signatures
Files
-
tmp.exe windows x86
ee04cf656fdf98ddbcb7f2441a988f8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetErrorMode
GlobalAlloc
GetProcAddress
GlobalLock
GetModuleHandleW
SleepEx
GlobalUnlock
lstrlenA
user32
CloseClipboard
OpenClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
shell32
ord66
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1014B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 875B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ