Static task
static1
Behavioral task
behavioral1
Sample
4945a9ea3587eb6fe3e1c176c382e9a7da44445255c1a29db3c86983fa6998fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4945a9ea3587eb6fe3e1c176c382e9a7da44445255c1a29db3c86983fa6998fd.exe
Resource
win10v2004-20220812-en
General
-
Target
4945a9ea3587eb6fe3e1c176c382e9a7da44445255c1a29db3c86983fa6998fd
-
Size
108KB
-
MD5
703e27d7f82722ac00f2e645d5c0987d
-
SHA1
7725834ff7d8791612b7e32bebc48c99befe2ef5
-
SHA256
4945a9ea3587eb6fe3e1c176c382e9a7da44445255c1a29db3c86983fa6998fd
-
SHA512
4884f45ca027b6bf64625a706fa4e9945bbb05062ab04b15b9e0d3b456e4942ac44933d3c7b3a54f0e77954f4bf3ed923dbc09123f5da7990ffc367dc756c593
-
SSDEEP
3072:KWPTXR+EmyAN/fIISrKqj/5e0MIqJKKVLcsp:KmB+EmH/fZSb01VX
Malware Config
Signatures
Files
-
4945a9ea3587eb6fe3e1c176c382e9a7da44445255c1a29db3c86983fa6998fd.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdata Size: 85KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
srncm Size: - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ocffsd Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
mems Size: - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ