Static task
static1
Behavioral task
behavioral1
Sample
4949236155853bfb2b51a7284b878d44be7afcdc5b53ad8136dbf531c368fd30.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4949236155853bfb2b51a7284b878d44be7afcdc5b53ad8136dbf531c368fd30.exe
Resource
win10v2004-20220812-en
General
-
Target
4949236155853bfb2b51a7284b878d44be7afcdc5b53ad8136dbf531c368fd30
-
Size
40KB
-
MD5
c77f1052e9b4d3056317fd3a960db29e
-
SHA1
0c078c162b2c32580932af9507c2dc11bf857fac
-
SHA256
4949236155853bfb2b51a7284b878d44be7afcdc5b53ad8136dbf531c368fd30
-
SHA512
652da75d2dd27271be427b8d26c0053fda8caafb77a4fd5e28643715ef873d28a88ca476a4f3dce78536129d5cb149e9a89f9ca2ff6a315db14a7cec8fedf98b
-
SSDEEP
768:e3gaFJOovMcW3oruwg/qOz6x6y2yu+nBft/gNBVwLd2Ti+/0ki9k:F6BvMroa8oyg+nBloNjwL9+/0kiO
Malware Config
Signatures
Files
-
4949236155853bfb2b51a7284b878d44be7afcdc5b53ad8136dbf531c368fd30.exe windows x86
7f6676f6c7d82d1ea33f369414348f3b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
OpenWaitableTimerW
GetDefaultCommConfigA
SetProcessAffinityMask
WriteProcessMemory
GetTickCount
AreFileApisANSI
GlobalUnlock
InterlockedDecrement
AssignProcessToJobObject
GetVersion
DeleteCriticalSection
WriteConsoleOutputW
GetTempPathA
user32
GetClipboardFormatNameW
IntersectRect
IsCharAlphaA
gdi32
CheckColorsInGamut
StartPage
PathToRegion
GetRgnBox
EngGetDriverName
Sections
.code Size: 9KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pack32 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE