Static task
static1
Behavioral task
behavioral1
Sample
46d6094ceac9e6045075c9c9dd56bd83e2a45aba09cbd17082452a8561be2efb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46d6094ceac9e6045075c9c9dd56bd83e2a45aba09cbd17082452a8561be2efb.exe
Resource
win10v2004-20220812-en
General
-
Target
46d6094ceac9e6045075c9c9dd56bd83e2a45aba09cbd17082452a8561be2efb
-
Size
187KB
-
MD5
d438249678c7181ddd1e1f9e35b8d68b
-
SHA1
59f1c83194a8b26d1769c8c729310c143bdf250f
-
SHA256
46d6094ceac9e6045075c9c9dd56bd83e2a45aba09cbd17082452a8561be2efb
-
SHA512
dce92ea0b5a51902c957d966ef526ddaa4470dc622673173e76bf2937f02afa949e9c2b9a73e30a82d26d27758bab47faf9a6ee38a0c88a9255c3cd5dc5be577
-
SSDEEP
3072:9k6WMSzjYH6/wyF9bwI6eiWOLYq2UwdP6svfQMKCEu5x1BwGyc9vP6ZFcx:9RWM3H2+I6xb2UwxLfQXuD9vS
Malware Config
Signatures
Files
-
46d6094ceac9e6045075c9c9dd56bd83e2a45aba09cbd17082452a8561be2efb.exe windows x86
aeb557dd97d8f8edc23417a92a660801
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleRun
MkParseDisplayName
CoReleaseMarshalData
CLSIDFromString
GetHGlobalFromStream
StringFromIID
StgOpenStorage
OleRegGetUserType
advapi32
RegCreateKeyA
GetLengthSid
version
VerQueryValueA
msvcrt
wcsncmp
user32
MapWindowPoints
RegisterClassA
LoadCursorA
PostMessageA
LoadKeyboardLayoutA
ReleaseDC
RedrawWindow
MessageBeep
PeekMessageW
RemovePropA
OemToCharA
ReleaseCapture
MessageBoxA
PostQuitMessage
PtInRect
LoadStringA
SendMessageW
RegisterWindowMessageA
SetActiveWindow
ScrollWindow
LoadBitmapA
MapVirtualKeyA
LoadIconA
PeekMessageA
SendMessageA
OffsetRect
ScreenToClient
RegisterClipboardFormatA
OpenClipboard
RemoveMenu
kernel32
GetEnvironmentStrings
GetStartupInfoA
EnterCriticalSection
GetCommandLineW
GetModuleHandleW
lstrlenA
SetFilePointer
FindResourceA
GetOEMCP
Sleep
LoadLibraryExA
WriteFile
lstrlenW
GetLastError
DeleteCriticalSection
lstrcmpiA
FormatMessageA
FreeResource
SetErrorMode
GetCommandLineA
RaiseException
GetThreadLocale
GetProcAddress
FreeLibrary
GetFileSize
CloseHandle
ReadFile
GetDateFormatA
CreateThread
VirtualAllocEx
HeapDestroy
CompareStringA
ExitProcess
ExitThread
GetCPInfo
lstrcatA
GetLocalTime
FindClose
GetVersion
FindFirstFileA
GetStringTypeW
WaitForSingleObject
SetEndOfFile
CreateFileA
GetFileType
GetACP
GetCurrentProcessId
GetFullPathNameA
SetEvent
GetModuleFileNameA
lstrcpyA
GetTickCount
HeapAlloc
LoadLibraryA
VirtualAlloc
GetVersionExA
GetModuleHandleA
MoveFileA
GetProcessHeap
LoadResource
GlobalDeleteAtom
IsBadHugeReadPtr
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ddata Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ