Static task
static1
Behavioral task
behavioral1
Sample
10304cc12cefdfb1ddb7ae2b65167cf42a48f074708d5ceff57db22068ac024d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
10304cc12cefdfb1ddb7ae2b65167cf42a48f074708d5ceff57db22068ac024d.exe
Resource
win10v2004-20220901-en
General
-
Target
10304cc12cefdfb1ddb7ae2b65167cf42a48f074708d5ceff57db22068ac024d
-
Size
90KB
-
MD5
651033c7c05c0ea149363f99c5bbd330
-
SHA1
aad56502a305a3cb37bf42324bfb940d135a8004
-
SHA256
10304cc12cefdfb1ddb7ae2b65167cf42a48f074708d5ceff57db22068ac024d
-
SHA512
19435458dd45e2d9f83d4e1ec079a787c6cc31bb13d8b2750db7e8927edf855e80f67268e481f0f4cfc5ec3e7837d7c9e98ebd8abf7b0fbbb14a01683437205f
-
SSDEEP
1536:wS/fduFNr8d6s3wSmESuxIIi/M7uFR/zJ0+EIs2V0myfB2o:llANwvnmXuxtiH/zJ0n2ryfB2o
Malware Config
Signatures
Files
-
10304cc12cefdfb1ddb7ae2b65167cf42a48f074708d5ceff57db22068ac024d.exe windows x86
2bcdad0972e4d80a3fe5cd1954bf787a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
ExitThread
GetProcAddress
LoadLibraryA
LocalFree
LocalAlloc
VirtualProtect
CloseHandle
HeapFree
ReadFile
SetFilePointer
HeapAlloc
GetProcessHeap
GetFileSize
CreateFileA
GetModuleFileNameA
VirtualFree
VirtualProtectEx
VirtualAllocEx
GetCurrentProcess
ExitProcess
GetComputerNameA
GetModuleHandleA
SuspendThread
InterlockedExchange
RtlUnwind
VirtualQuery
user32
PostQuitMessage
RegisterClassA
DispatchMessageA
GetMessageA
MoveWindow
CreateWindowExA
RegisterClassExA
GetWindow
PostMessageA
GetActiveWindow
DefWindowProcA
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ