Static task
static1
Behavioral task
behavioral1
Sample
4fe4956e1ad3af6ab9366d865277c6a98ff1f965d3d6c105132591d55486fdc5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4fe4956e1ad3af6ab9366d865277c6a98ff1f965d3d6c105132591d55486fdc5.exe
Resource
win10v2004-20220812-en
General
-
Target
4fe4956e1ad3af6ab9366d865277c6a98ff1f965d3d6c105132591d55486fdc5
-
Size
124KB
-
MD5
3d6292ccb0bd775e54e73f96710f11fd
-
SHA1
8088b0c10aed1bd4cf8cd1e92e611d19cc6b8e5e
-
SHA256
4fe4956e1ad3af6ab9366d865277c6a98ff1f965d3d6c105132591d55486fdc5
-
SHA512
c420fb4b3558ace98d834c179c66138a7614f71f2351ea10962f3429aaac9d0982611b75b80c119a676a25dd30a282d0ea48f2731519f8c5f90d5c29f60ffac6
-
SSDEEP
3072:ku14/2zGj1BQJHSj0PdVmN6eUnr7vf9lrvsu:Le2K1iM0lkNtUnr7v3
Malware Config
Signatures
Files
-
4fe4956e1ad3af6ab9366d865277c6a98ff1f965d3d6c105132591d55486fdc5.exe windows x86
97d0062ee40a69dd10a087b00adfa66d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
DuplicateHandle
GetShortPathNameA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 48KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE