Static task
static1
Behavioral task
behavioral1
Sample
483d00446571fadebc88f60ad2d46b68febe4d5acb64de86be2644eb7a89bbd9.exe
Resource
win7-20220812-en
General
-
Target
483d00446571fadebc88f60ad2d46b68febe4d5acb64de86be2644eb7a89bbd9
-
Size
84KB
-
MD5
08b18bdbc30f199fa7a03e6dfdb37330
-
SHA1
52516279cad0904d773af1e4e36f19ce4a0c90de
-
SHA256
483d00446571fadebc88f60ad2d46b68febe4d5acb64de86be2644eb7a89bbd9
-
SHA512
3f20afc25c40e7a4b75389a638147c4b0187e9d8dc792e5dd82235b920cfbb3d76d1916d3b6d4522a6e79f158f73dd1c278cfa8b39770b62e8070cd66a4b88a8
-
SSDEEP
1536:hxIk2dnNLJI3jdp6LxqcGJyZJiFz5EEIY07KaVyy4:hxOdg3jdp6jioJw9Eu07Nyy
Malware Config
Signatures
Files
-
483d00446571fadebc88f60ad2d46b68febe4d5acb64de86be2644eb7a89bbd9.exe windows x86
3f55af940c786b7b21a6107c1cc55f20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyW
ExitProcess
GetCommandLineW
SetPriorityClass
CreateProcessW
GetCurrentProcess
WaitForSingleObject
GetPriorityClass
GetExitCodeProcess
lstrcpynW
LocalAlloc
GetModuleFileNameW
CompareStringW
SetCurrentDirectoryW
lstrcmpiW
CloseHandle
LocalFree
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LocalLock
GetFileAttributesW
lstrlenW
IsDebuggerPresent
user32
MessageBoxW
WaitForInputIdle
advapi32
OpenProcessToken
GetTokenInformation
shell32
CommandLineToArgvW
ShellExecuteExW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE