Static task
static1
Behavioral task
behavioral1
Sample
f1841c4052a11d843a4c46acca82dedac87c45dd5765b8c15ea97ed8eedee369.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1841c4052a11d843a4c46acca82dedac87c45dd5765b8c15ea97ed8eedee369.exe
Resource
win10v2004-20220901-en
General
-
Target
f1841c4052a11d843a4c46acca82dedac87c45dd5765b8c15ea97ed8eedee369
-
Size
76KB
-
MD5
663cbb243b829d7802f84db54a289200
-
SHA1
9240f1c9ea18c2567f8ef21f2c47b528dbcd2ed4
-
SHA256
f1841c4052a11d843a4c46acca82dedac87c45dd5765b8c15ea97ed8eedee369
-
SHA512
9b7b6808b0c007270e01957630d4449b8c164cb0b9c2a427d7ac2d4e71bc4ad1acb726079a98cc3ebc0c3a1ee8f2e15738802456dd4a1537f5059caab93fcef9
-
SSDEEP
768:KaMpdNRohJlPqnPGyy++Sr4hX0ytPCZ8TSnA/wo0Z5ffFnkBH2vkKuGdX7+wVGyb:MVmJCei4hXAu/CZ3ngHMruGdL+qpo6
Malware Config
Signatures
Files
-
f1841c4052a11d843a4c46acca82dedac87c45dd5765b8c15ea97ed8eedee369.exe windows x86
681ff880bee1d72b72995d03b85309b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
VirtualAlloc
GetProcAddress
GetModuleHandleA
GetCommandLineA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
HeapReAlloc
lstrcmpiA
GetStringTypeA
GetModuleHandleW
HeapAlloc
GetOEMCP
GetACP
GetStartupInfoA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
GetCPInfo
GetStringTypeW
user32
GetSystemMetrics
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ