Static task
static1
Behavioral task
behavioral1
Sample
4a1ef71dab5cde1608895bc66913f5c6e5567af96823b572050ed49b1152fa99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a1ef71dab5cde1608895bc66913f5c6e5567af96823b572050ed49b1152fa99.exe
Resource
win10v2004-20220812-en
General
-
Target
4a1ef71dab5cde1608895bc66913f5c6e5567af96823b572050ed49b1152fa99
-
Size
384KB
-
MD5
1bf689d0b79241a9e8115c246201f495
-
SHA1
0628ff061908ebd5feaed14ba347ab42cb381474
-
SHA256
4a1ef71dab5cde1608895bc66913f5c6e5567af96823b572050ed49b1152fa99
-
SHA512
21f30c6647636f68acb0f7ec612eb127e90c0276bf0aa925f3075ef255cd258763e318769034c7d0296d8911802c482b18d455e6ecf43a71048323b1a9a3e2ca
-
SSDEEP
6144:MptuVyRv55G5ke9MRs0On1SIFs7Bqwtj9kJ8c0IITjZ0N7/cYL9duz4hwOUu808R:BeR5GdCs0O1BkBqwtjFc0fTjZOT59ozj
Malware Config
Signatures
Files
-
4a1ef71dab5cde1608895bc66913f5c6e5567af96823b572050ed49b1152fa99.exe windows x86
62da7990bf7df306e1d1dba7cc0433fa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LocalUnlock
GetConsoleCP
CreateEventA
CreateFileA
GetStdHandle
GetFullPathNameA
HeapCreate
LocalFree
CreateFileMappingA
GetLastError
DisconnectNamedPipe
FindClose
FreeEnvironmentStringsA
IsDebuggerPresent
CloseHandle
LoadLibraryExA
GetACP
GlobalLock
IsBadReadPtr
user32
CreateDialogParamA
SetFocus
ScrollWindow
EmptyClipboard
GetDC
DefWindowProcA
GetIconInfo
IsWindow
GetMessageA
GetDlgItem
EndDialog
DispatchMessageA
PostMessageA
DrawIconEx
uxtheme
CloseThemeData
DrawThemeIcon
EnableTheming
GetThemeMetric
GetThemeColor
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ