Static task
static1
Behavioral task
behavioral1
Sample
4fdd8ed749d9040aae4cd65259d0412e1d12b3d3448e9e6f7a8d894e0f57b194.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4fdd8ed749d9040aae4cd65259d0412e1d12b3d3448e9e6f7a8d894e0f57b194.exe
Resource
win10v2004-20220812-en
General
-
Target
4fdd8ed749d9040aae4cd65259d0412e1d12b3d3448e9e6f7a8d894e0f57b194
-
Size
35KB
-
MD5
3c5da62d5a5a2731c79084c31cc7c920
-
SHA1
adf3763cbdd8ad11bf0d01f2c5f0fc4e8eec652b
-
SHA256
4fdd8ed749d9040aae4cd65259d0412e1d12b3d3448e9e6f7a8d894e0f57b194
-
SHA512
5b47883e82b66063b1ed181d9a2b4f6df0153cd9f18281456d7ee937be99188d50b204e8c657418072ba2c48589a049967463470836c40ae6dff3cb97ad5cca9
-
SSDEEP
768:+H8IGdhhRexR42ohaPTUsghehC52nWWMnc5DVqOcPA2Y:+cIGdhhReXYwYs0efnvMnaDEOYAD
Malware Config
Signatures
Files
-
4fdd8ed749d9040aae4cd65259d0412e1d12b3d3448e9e6f7a8d894e0f57b194.exe windows x86
9b4db9d3b9ccad0d70f1b7c24f559950
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
kernel32
WaitForSingleObject
lstrcpyW
CompareStringW
CreateProcessW
CloseHandle
ExitProcess
lstrlenW
lstrcpynW
GetModuleHandleA
GlobalAlloc
GlobalLock
LocalAlloc
GetThreadLocale
GlobalUnlock
GlobalFree
LocalFree
GetCommandLineW
GetSystemWindowsDirectoryW
user32
LoadStringW
wsprintfW
MessageBoxW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hsivuht Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE