Static task
static1
Behavioral task
behavioral1
Sample
5c78338660807378bbe25f62b7debbc3b18b2cf9ac41651cbd6ba1f6264a6bca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c78338660807378bbe25f62b7debbc3b18b2cf9ac41651cbd6ba1f6264a6bca.exe
Resource
win10v2004-20220812-en
General
-
Target
5c78338660807378bbe25f62b7debbc3b18b2cf9ac41651cbd6ba1f6264a6bca
-
Size
3KB
-
MD5
be993148f4134d8b21ec158380577be6
-
SHA1
7fc1c1d95ee7ed12d4ef185dbe02fd94110b3030
-
SHA256
5c78338660807378bbe25f62b7debbc3b18b2cf9ac41651cbd6ba1f6264a6bca
-
SHA512
3c8cfcf3b0aa50cfff78599fab6800fd894b2d03d8f4c9e51329340cf82c848905fb905d5ed7a9bf5ed1dda0abc54852c1b09a6c17de82fb58d112e1eae35dbb
Malware Config
Signatures
Files
-
5c78338660807378bbe25f62b7debbc3b18b2cf9ac41651cbd6ba1f6264a6bca.exe windows x86
5c8c1d7a21463a5b865a24391464bdf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
user32
FindWindowA
GetWindowThreadProcessId
kernel32
CreateRemoteThread
lstrlenA
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetProcAddress
CloseHandle
CreateFileA
ExitProcess
GetModuleHandleA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE