Static task
static1
Behavioral task
behavioral1
Sample
5833a8c14b58712eed2f97a0656b9b5e230fd5946cbd8ad7ce38d1ef49c12044.exe
Resource
win7-20220812-en
General
-
Target
5833a8c14b58712eed2f97a0656b9b5e230fd5946cbd8ad7ce38d1ef49c12044
-
Size
316KB
-
MD5
625c102e37956a344ceb592ea4dea2d6
-
SHA1
a758e9702bdf566967326c7eba7de6c8789133bd
-
SHA256
5833a8c14b58712eed2f97a0656b9b5e230fd5946cbd8ad7ce38d1ef49c12044
-
SHA512
fd851049a90cb3da8fa481491491b5921db067eb9b7eac1a0653643852e59bc9527fa3633cc74195e4e47ca0aef4e0506228f28403afbb56a309d527a89317ed
-
SSDEEP
6144:ZlYW5b8A6SS823DNW0JmxuGAd39RJTKD8Xe12bwa82goPL2:Dd8JzjGAd3VKDkT5NT2
Malware Config
Signatures
Files
-
5833a8c14b58712eed2f97a0656b9b5e230fd5946cbd8ad7ce38d1ef49c12044.exe windows x86
65c42d2f3cbe83d61386ec9266189707
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
ExitProcess
FindResourceA
GetModuleFileNameA
GetThreadContext
GetTickCount
LoadResource
LockResource
ReadProcessMemory
ResumeThread
SetThreadContext
SizeofResource
VirtualAlloc
VirtualAllocEx
VirtualFree
WriteProcessMemory
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ccccc Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ