Static task
static1
Behavioral task
behavioral1
Sample
40f04a3e812d0ca1783a518ff9098659f72de7949f718dff111eb7797dc0bf29.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
40f04a3e812d0ca1783a518ff9098659f72de7949f718dff111eb7797dc0bf29.exe
Resource
win10v2004-20220812-en
General
-
Target
40f04a3e812d0ca1783a518ff9098659f72de7949f718dff111eb7797dc0bf29
-
Size
62KB
-
MD5
02832a0763b389251b429781c01c9970
-
SHA1
a0f8493c0cdc5222be5709ef268af665ee0d588a
-
SHA256
40f04a3e812d0ca1783a518ff9098659f72de7949f718dff111eb7797dc0bf29
-
SHA512
ee871a49f79cce02d9197fef49f0291d997ba5063c8780cd8e4168bac24adfc1f2d45f174aff1534861723db5946d423dfcbb04a52e3a85ef6cfea3bb7dfb92b
-
SSDEEP
1536:9MA/i/8eLv9lMCOCPLGJFS0wQ5BGB0eEqoT+eXzQ2bee:9MA/m86xOACJAQ5wXVE+us2d
Malware Config
Signatures
Files
-
40f04a3e812d0ca1783a518ff9098659f72de7949f718dff111eb7797dc0bf29.exe windows x86
6996beda09707c702fb4b0a05b72890e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNamedPipeInfo
AddAtomW
DisableThreadLibraryCalls
OpenJobObjectW
DuplicateConsoleHandle
GetProcessHeap
SetCurrentDirectoryA
FindFirstFileExW
CreateVirtualBuffer
GetFileType
VDMConsoleOperation
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE