Static task
static1
Behavioral task
behavioral1
Sample
45f7eecc15331b68435cdecfaa9a3ba73e2bdb74ad2653b8a34dcf7c66a4f83c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
45f7eecc15331b68435cdecfaa9a3ba73e2bdb74ad2653b8a34dcf7c66a4f83c.exe
Resource
win10v2004-20220901-en
General
-
Target
45f7eecc15331b68435cdecfaa9a3ba73e2bdb74ad2653b8a34dcf7c66a4f83c
-
Size
56KB
-
MD5
32df621458eff1063271078618fc1e61
-
SHA1
8eeb69bf4bf09880dfe40b063b361f1cde567adf
-
SHA256
45f7eecc15331b68435cdecfaa9a3ba73e2bdb74ad2653b8a34dcf7c66a4f83c
-
SHA512
63d1a9fa36eaf056b2b587347cbf90e970db443d15a77661ffa471a57550345ce1b1d038aafe239bca31e4357f6cdfabd55176ce389ac633362f6eb132488bba
-
SSDEEP
768:yfajVDtBMgfhbD5SzpfKE+dxlcSY5gfi2yYG+WN6QootbxAs6DWPe24mvS9Zu+v0:y6/h5m+dxmJhgloFxAssWNtKmkkq6xGy
Malware Config
Signatures
Files
-
45f7eecc15331b68435cdecfaa9a3ba73e2bdb74ad2653b8a34dcf7c66a4f83c.exe windows x86
1c08c4afb325b7332594a0249fdfafaa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynA
CreateProcessW
ResumeThread
SetConsoleCursorMode
EnumCalendarInfoExW
GetFileTime
GetProcessAffinityMask
GetComputerNameA
GetLogicalDrives
TerminateThread
GetFirmwareEnvironmentVariableW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE