Static task
static1
Behavioral task
behavioral1
Sample
453a9493db407626a46623da9738e7cee8a52589ba9e52aa83b4c316fc4e9fe4.exe
Resource
win7-20220812-en
General
-
Target
453a9493db407626a46623da9738e7cee8a52589ba9e52aa83b4c316fc4e9fe4
-
Size
204KB
-
MD5
6d78f7005e26c3b3d63475acceff0c60
-
SHA1
ee9cf6a8b66bcb1c27750ab21ba58750b66e2a90
-
SHA256
453a9493db407626a46623da9738e7cee8a52589ba9e52aa83b4c316fc4e9fe4
-
SHA512
8875441c382a3ca205571fdd871e1e73d42b118471a17c92227a09751bd7af32f617d4aa79c8713a20f15c666eac77dd78b95943994c32f97a444e5e738cc693
-
SSDEEP
3072:XnK0ND64/QDv9OaGaBptTFpTcJuNeLGtrpf/UQmm0zzUZWZDHp9u3+VzbUJPAXVy:JeqK4aGwPTFpTcwpUDoMDDVsJVissO
Malware Config
Signatures
Files
-
453a9493db407626a46623da9738e7cee8a52589ba9e52aa83b4c316fc4e9fe4.exe windows x86
b3557dffa6d810f6a9d28e0300f50338
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetExitCodeProcess
GetDriveTypeA
GetSystemDirectoryA
GetCurrentDirectoryA
CloseHandle
GetDiskFreeSpaceA
WaitForSingleObject
CreateEventA
GetFileAttributesA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
CreateFileA
SetFileTime
CreateThread
LocalFileTimeToFileTime
CreateDirectoryA
HeapAlloc
HeapFree
SetFilePointer
ReadFile
WriteFile
ExitProcess
GetLastError
RemoveDirectoryA
DeleteFileA
TerminateProcess
SetEvent
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
DosDateTimeToFileTime
FormatMessageA
user32
EndDialog
SendDlgItemMessageA
LoadStringA
DialogBoxParamA
ShowWindow
SendMessageA
MessageBoxA
comctl32
ord17
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ntdll
strstr
_allmul
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zero Size: - Virtual size: 66KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 179KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE