Static task
static1
Behavioral task
behavioral1
Sample
a4d71c51a8da5f1e6fbe2e339476a2b12727ef16fa3dbb27aaf58dcf6f6d85ba.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a4d71c51a8da5f1e6fbe2e339476a2b12727ef16fa3dbb27aaf58dcf6f6d85ba.exe
Resource
win10v2004-20220812-en
General
-
Target
a4d71c51a8da5f1e6fbe2e339476a2b12727ef16fa3dbb27aaf58dcf6f6d85ba
-
Size
62KB
-
MD5
660e899cce1781ba96810583d9b61230
-
SHA1
3c5c464bda1a03f1ddf4a748aa7e812922d9b3ad
-
SHA256
a4d71c51a8da5f1e6fbe2e339476a2b12727ef16fa3dbb27aaf58dcf6f6d85ba
-
SHA512
d484d94b414dace0a0ef4a1c62e9ed776808b7187892babb35e5dd0ea08cd260d51fc3d3ea049fda13b0b369334ec09224fd0feb9f2d2609a262ec322fc50d5c
-
SSDEEP
768:VoKrpPQ3AbuN+XJQ2YEBwKtWch+vkH1JYkyEGMAxVmG17DJ74akR4IMEOOuo:RNyAbekJQ2dfh+6TE7MWmGxN4jqIMBfo
Malware Config
Signatures
Files
-
a4d71c51a8da5f1e6fbe2e339476a2b12727ef16fa3dbb27aaf58dcf6f6d85ba.exe windows x86
6fdcff1eab6845e9015811dbaf916a07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
VirtualQuery
GetVolumePathNameA
GetEnvironmentVariableA
FindResourceW
TlsGetValue
Sleep
CloseHandle
GetTimeFormatA
GetModuleHandleA
HeapCreate
lstrlenA
CloseHandle
DeleteFileW
GetStartupInfoA
ResetEvent
CreateEventA
GetCommandLineA
GetCommandLineA
CancelIo
user32
CallWindowProcA
FindWindowA
GetClassInfoA
GetWindowLongA
CreateIcon
IsWindow
GetSysColor
DispatchMessageA
DestroyMenu
IsZoomed
DispatchMessageA
DrawTextW
PeekMessageA
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE