Static task
static1
Behavioral task
behavioral1
Sample
74683a13735a88d1b4f3015afc12fb44bf4a3e35bb3194c6637660a13d2c1d51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74683a13735a88d1b4f3015afc12fb44bf4a3e35bb3194c6637660a13d2c1d51.exe
Resource
win10v2004-20220812-en
General
-
Target
74683a13735a88d1b4f3015afc12fb44bf4a3e35bb3194c6637660a13d2c1d51
-
Size
132KB
-
MD5
703ba78df3ca386c9bcbc6afc23e24f8
-
SHA1
8a4159cf79e320b84fa3c5097726937f046b7ea5
-
SHA256
74683a13735a88d1b4f3015afc12fb44bf4a3e35bb3194c6637660a13d2c1d51
-
SHA512
f9f603c7a826deab0cf7a4e2b2b2f84d8e21e6f64ec8b4e674d4e1c137f82b62794e358eef1a998542e78481aa7bec3b88c96e994e47d5fa9dc7df0fed04dbf2
-
SSDEEP
3072:otKbcsEcv96LvcQe4PMkPrxfKXXVW49jb:otKbcsF9ede4hKXFRjb
Malware Config
Signatures
Files
-
74683a13735a88d1b4f3015afc12fb44bf4a3e35bb3194c6637660a13d2c1d51.exe windows x86
a5e1b6089874320c75cc879280ef9c3f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
ReadFile
CloseHandle
WriteFile
CreateFileA
DeleteFileA
lstrlenA
lstrcatA
lstrcpyA
HeapAlloc
GetProcessHeap
GetTempPathA
GetTickCount
ResumeThread
GetProcAddress
LoadLibraryA
VirtualProtect
HeapFree
user32
GetWindowLongA
IsChild
WaitForInputIdle
GetActiveWindow
SetActiveWindow
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 628B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE