Static task
static1
Behavioral task
behavioral1
Sample
7a865c1224ad9c513adda0dc42a589dae762b4e8fcd822ef9d6fef83d01b5642.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7a865c1224ad9c513adda0dc42a589dae762b4e8fcd822ef9d6fef83d01b5642.exe
Resource
win10v2004-20220812-en
General
-
Target
7a865c1224ad9c513adda0dc42a589dae762b4e8fcd822ef9d6fef83d01b5642
-
Size
89KB
-
MD5
05d4ba669d17ed4eda15842961873aa1
-
SHA1
3d35fa2779e349f41f1b020be76b16ecc0d07ff0
-
SHA256
7a865c1224ad9c513adda0dc42a589dae762b4e8fcd822ef9d6fef83d01b5642
-
SHA512
2d9348730311e4bac61fdb102d8023b5165d4de55473a67e9a129adde565dd08258950608f0624eafe66871bb63d391698e641bcf1d97157a157489c559e139e
-
SSDEEP
768:ps2FSz2k2ueHQbHpmhaA9qEedZ7UQ/VsjPHMaBqn5Zu09wtQIhfCNlsOIVyeOJPL:pzFSLoo/aCUYMVdOJiN9FPaeXKQp
Malware Config
Signatures
Files
-
7a865c1224ad9c513adda0dc42a589dae762b4e8fcd822ef9d6fef83d01b5642.exe windows x86
5695529c7e4ef735d0cbbbaf3d336e77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
FlushFileBuffers
HeapAlloc
GetLastError
OpenFileMappingA
DeleteFileW
ExitProcess
WriteFile
GetCPInfo
HeapFree
DeleteFileA
GetPriorityClass
lstrcmpA
CopyFileExA
GetCommandLineA
advapi32
RegEnumValueW
RegCreateKeyA
RegDeleteValueW
RegQueryValueExW
RegQueryInfoKeyA
RegDeleteValueA
user32
EndDialog
GetDlgItem
CreateIcon
GetScrollPos
GetCursor
GetWindowTextLengthA
Sections
.5g21 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.a95ch Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.791a Size: 44KB - Virtual size: 415KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.2bac Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hdfb Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ