Static task
static1
Behavioral task
behavioral1
Sample
d457e62616320077d2b7a020c1e15fe4fc1def4641d0a96e6aa0478dadf6098a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d457e62616320077d2b7a020c1e15fe4fc1def4641d0a96e6aa0478dadf6098a.exe
Resource
win10v2004-20220812-en
General
-
Target
d457e62616320077d2b7a020c1e15fe4fc1def4641d0a96e6aa0478dadf6098a
-
Size
13KB
-
MD5
4755e194229e52d39cfb414184df8cb0
-
SHA1
45d9758fbefba3c12b0d2b067a1c0fdc7ffc5eb8
-
SHA256
d457e62616320077d2b7a020c1e15fe4fc1def4641d0a96e6aa0478dadf6098a
-
SHA512
f79265c1bedccae1e8a13327196f4eb5d5a2f2609c58e4c7935e24580dd3b4b398383a9c2e6c57db366b414307aaf9cd45bdf0c6c1e0a334a69eb09c90554d98
-
SSDEEP
384:IcfbfuxUqJZStk2OSqg4IxQszlToXr5Zld+Go4Oi:IqfaUhhUIxJTKDp5Oi
Malware Config
Signatures
Files
-
d457e62616320077d2b7a020c1e15fe4fc1def4641d0a96e6aa0478dadf6098a.exe windows x86
b0452df5ed5a705c13e22533cc766734
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
GetTickCount
WriteFile
OpenProcess
Sleep
ReadProcessMemory
GetLastError
GetProcAddress
Module32FirstW
GetModuleHandleA
CreateMutexA
CreateToolhelp32Snapshot
Module32NextW
GetVersionExA
CloseHandle
GetCurrentProcessId
GetTempPathA
WriteProcessMemory
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RaiseException
IsDebuggerPresent
TerminateProcess
user32
SendMessageW
GetSystemMetrics
FindWindowExA
FindWindowA
GetWindowThreadProcessId
MoveWindow
GetWindowRect
shell32
ShellExecuteA
wininet
HttpOpenRequestA
HttpSendRequestA
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetReadFile
msvcr100
memset
memcpy
_itoa
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__CxxFrameHandler3
?terminate@@YAXXZ
_crt_debugger_hook
??2@YAPAXI@Z
??3@YAXPAX@Z
_wcsicmp
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
memmove
memchr
rand
srand
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 922B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ