Static task
static1
Behavioral task
behavioral1
Sample
edcbf4f868b5ff1ed7dad8ea28f91fd82f3c61839da8fe89806c408315d4bb54.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
edcbf4f868b5ff1ed7dad8ea28f91fd82f3c61839da8fe89806c408315d4bb54.exe
Resource
win10v2004-20220812-en
General
-
Target
edcbf4f868b5ff1ed7dad8ea28f91fd82f3c61839da8fe89806c408315d4bb54
-
Size
83KB
-
MD5
6253d008fe327b8f64c4cf155e13bb47
-
SHA1
8bd4d2667afc3c8741bebf2d2e1f5a20df85be4c
-
SHA256
edcbf4f868b5ff1ed7dad8ea28f91fd82f3c61839da8fe89806c408315d4bb54
-
SHA512
f12b440cff01161e2558fd5dfe3e994d7a28e4a8f349c40e01d9a0fbea2dfdb40d099e1441303d716df58dad760717058c54875839f33a832eb3bb3d8eaae261
-
SSDEEP
1536:ppeizgjQmz5WGmIDgxkB+u3H0GIOjSreNzWyiDLHgBzETH9iy:vzgjVzPmXhu31IGNzFO+zzy
Malware Config
Signatures
Files
-
edcbf4f868b5ff1ed7dad8ea28f91fd82f3c61839da8fe89806c408315d4bb54.exe windows x86
79adf68a6be58f35454111976c281f7e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualFree
GetCurrentThread
CreateFileA
DeleteFileA
GetProcAddress
LoadLibraryA
GetCurrentThreadId
VirtualProtect
CloseHandle
LocalFree
ReadFile
SetFilePointer
LocalAlloc
GetFileSize
GetModuleFileNameA
GetCurrentDirectoryA
GetSystemDirectoryA
SuspendThread
VirtualAllocEx
CreateThread
ExitProcess
GetModuleHandleA
GetStdHandle
Sleep
user32
CreateDialogParamA
GetActiveWindow
GetWindow
ShowWindow
SendMessageA
wsprintfA
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ