Static task
static1
Behavioral task
behavioral1
Sample
56f41a99f3f4457f57f3f0645503f4e56e385118283be30f82c050aaba11f20b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56f41a99f3f4457f57f3f0645503f4e56e385118283be30f82c050aaba11f20b.exe
Resource
win10v2004-20220812-en
General
-
Target
56f41a99f3f4457f57f3f0645503f4e56e385118283be30f82c050aaba11f20b
-
Size
360KB
-
MD5
2110cd662af2fd155db6a6bd501eea01
-
SHA1
8b046977b3c425a7241570e9b545a7d75087b9fc
-
SHA256
56f41a99f3f4457f57f3f0645503f4e56e385118283be30f82c050aaba11f20b
-
SHA512
556cca2e676c2f83682645b73489a727e2b778c963f049a9965ea279b94265fdffc59979567a2ddaf7ad81ce5b5bf44128ab783cd3eb8febc3e4ea571c99cf08
-
SSDEEP
6144:frbDjPYecuazq/w4sEBPrRw4k2hiZ6J4GJfOzMkfeFoldsRGx:frbDjQuHo5erRw4AAJL0zZmFon
Malware Config
Signatures
Files
-
56f41a99f3f4457f57f3f0645503f4e56e385118283be30f82c050aaba11f20b.exe windows x86
1c6ed2509f1cca5f4bacf18525e54dd1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetLastError
GlobalLock
ExitProcess
GetSystemDirectoryA
GetSystemTime
GetProcAddress
GetFileType
ResumeThread
VirtualFreeEx
Sleep
GetProcessHeap
GetTempPathA
VirtualLock
SetEvent
LeaveCriticalSection
VirtualQuery
user32
DestroyWindow
GetTopWindow
UpdateWindow
GetSysColorBrush
LoadAcceleratorsA
IsZoomed
advapi32
CopySid
AddAce
ole32
CoUninitialize
psapi
EnumProcessModules
msvfw32
DrawDibDraw
avifil32
AVIStreamCreate
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 300KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8KB - Virtual size: 354KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ