Static task
static1
Behavioral task
behavioral1
Sample
450138889dc79d65fe2c8da366f91599eeb992cb4c17e3445c210ae3bf4299f0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
450138889dc79d65fe2c8da366f91599eeb992cb4c17e3445c210ae3bf4299f0.exe
Resource
win10v2004-20220812-en
General
-
Target
450138889dc79d65fe2c8da366f91599eeb992cb4c17e3445c210ae3bf4299f0
-
Size
35KB
-
MD5
7ca464fc6232c5a4ceaaaa8d3c9ab816
-
SHA1
5e0164924455093f69c58ad4884c9d7f78f808f3
-
SHA256
450138889dc79d65fe2c8da366f91599eeb992cb4c17e3445c210ae3bf4299f0
-
SHA512
e9f1979d3195c72f22c200c36d0c2fa6dd146e1ea4374107471ee222d71356709f7a2df36b1f7c554d0b4fa03915eecc2595b7a39694ad41632e7f9be97f2f0a
-
SSDEEP
768:5zAE0D0IWVGltKwzB6StmgJVwM/hM/Ju0yFGOd:5eD0IGbY6Sw2VwEhM/JuNd
Malware Config
Signatures
Files
-
450138889dc79d65fe2c8da366f91599eeb992cb4c17e3445c210ae3bf4299f0.exe windows x86
a5265bcc3e4452be2aedf8c4f6a345c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
LocalAlloc
LocalFree
CreateFileA
GetFileSize
lstrlenA
LoadLibraryExW
WriteFile
GetProcAddress
CloseHandle
ExitProcess
GetComputerNameA
MoveFileExA
GetCurrentProcess
Sleep
CreateEventA
TerminateProcess
GetSystemDirectoryA
lstrcatA
lstrlenW
LoadLibraryA
OpenEventA
GetModuleFileNameA
lstrcatW
lstrcpyA
shlwapi
StrToIntA
imagehlp
CheckSumMappedFile
ole32
CLSIDFromString
StringFromCLSID
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ipbxjad Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE