Static task
static1
Behavioral task
behavioral1
Sample
51dc3add5736fb145dfa30f7cddeca3b390334d4b3dd1ae6e32266d9f56aae49.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
51dc3add5736fb145dfa30f7cddeca3b390334d4b3dd1ae6e32266d9f56aae49.exe
Resource
win10v2004-20220812-en
General
-
Target
51dc3add5736fb145dfa30f7cddeca3b390334d4b3dd1ae6e32266d9f56aae49
-
Size
416KB
-
MD5
65446b71abbf3b51a4dc0afefc750890
-
SHA1
aa77c8c4b0ad79a9dda101653b960c1767947870
-
SHA256
51dc3add5736fb145dfa30f7cddeca3b390334d4b3dd1ae6e32266d9f56aae49
-
SHA512
f06320ddc57cc9c8f5defaa576b5ed0b75624240c68bdb1246720a95f8e087afe13b8772be62779e91181f0ff930e955e155c6c991ac39937d8dbfbd5738cdc2
-
SSDEEP
12288:mWSg9tTe+tQmqelgczlFbbi68nnmh0d4c:VSgftXqelg6Lbqmad4c
Malware Config
Signatures
Files
-
51dc3add5736fb145dfa30f7cddeca3b390334d4b3dd1ae6e32266d9f56aae49.exe windows x86
596bc950a6b2031120868b3a79ef4671
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetPriorityClass
VirtualProtect
ResumeThread
GetFileAttributesW
GetModuleHandleA
DeleteFileA
GetStdHandle
GetCommandLineA
SetEndOfFile
ResumeThread
CreateDirectoryA
HeapSize
WriteFile
GetLocaleInfoA
SuspendThread
CreatePipe
GetProcessHeap
IsBadReadPtr
GetDriveTypeA
ReadConsoleW
GlobalSize
user32
DestroyIcon
GetWindowLongA
GetScrollInfo
LoadCursorA
DestroyMenu
GetWindowLongA
SetCursor
SetRect
wsprintfA
GetWindowTextW
DrawIcon
DispatchMessageA
PeekMessageA
els
DllUnregisterServer
DllRegisterServer
DllGetClassObject
DllCanUnloadNow
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 410KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE