Static task
static1
Behavioral task
behavioral1
Sample
4a3625e78449507e14d5da4074e9fc13c8abd6b3177dd3008259dfa20f674f45.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4a3625e78449507e14d5da4074e9fc13c8abd6b3177dd3008259dfa20f674f45.exe
Resource
win10v2004-20220812-en
General
-
Target
4a3625e78449507e14d5da4074e9fc13c8abd6b3177dd3008259dfa20f674f45
-
Size
235KB
-
MD5
674eae721fb790d4243a8f6496b4c690
-
SHA1
0377c7f9d77d458751a37f222d95b8aaba1b0f43
-
SHA256
4a3625e78449507e14d5da4074e9fc13c8abd6b3177dd3008259dfa20f674f45
-
SHA512
0b058d7739b72f20f9808280d0d697489dc6a47c23b1a7c463bed94ed2739cf4dfd88ed494d183f26f969139ed59b5829a23ff80c6636e45a062421868d01c31
-
SSDEEP
6144:JepS2tvDNG2WIQZztQhRj3vqBO5jeRFchgr8WPHSVF4:Qp7xDgZoCcjeRFchp/m
Malware Config
Signatures
Files
-
4a3625e78449507e14d5da4074e9fc13c8abd6b3177dd3008259dfa20f674f45.exe windows x86
1323c5dacf3d44a8d539b613cd841902
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlZeroMemory
CreateThread
lstrcpyA
SetUnhandledExceptionFilter
WaitForSingleObject
LoadLibraryA
GetProcAddress
TerminateProcess
GlobalAlloc
ExitProcess
ntdll
_wcsicmp
user32
GetMessageA
KillTimer
TranslateMessage
CreateWindowExA
ShowWindow
UpdateWindow
DispatchMessageW
comdlg32
GetOpenFileNameW
powrprof
GetActivePwrScheme
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ