Static task
static1
Behavioral task
behavioral1
Sample
403bd25171829d1fdd84c75708f9d33cbd9f572703c84709efb7548588a28486.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
403bd25171829d1fdd84c75708f9d33cbd9f572703c84709efb7548588a28486.exe
Resource
win10v2004-20220812-en
General
-
Target
403bd25171829d1fdd84c75708f9d33cbd9f572703c84709efb7548588a28486
-
Size
478KB
-
MD5
53c7dc8e32134900801aad1421ad0af0
-
SHA1
2565e54e43dee44f91f4b30608242d2bed4102f8
-
SHA256
403bd25171829d1fdd84c75708f9d33cbd9f572703c84709efb7548588a28486
-
SHA512
e1b8a480553a3483ac422bb6f07130494d591955f07ced56711969a3175a8e306254d21101517607e5fa5c905e2f8e0458f24a596b099b56383e2cdefc9fcfc4
-
SSDEEP
12288:82D97cl4yeT0efeqI4DySFEV59wFxNuNuD9Z+:82D97cl4y4bvD7OV5ki+T+
Malware Config
Signatures
Files
-
403bd25171829d1fdd84c75708f9d33cbd9f572703c84709efb7548588a28486.exe windows x86
022e6dcf2a1175268464bc0866ae8edf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlWriteRegistryValue
DbgUiWaitStateChange
user32
SetWindowsHookW
GetProcessWindowStation
kernel32
GetUserDefaultLangID
Sections
.text Size: 471KB - Virtual size: 472KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 345B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE