Static task
static1
Behavioral task
behavioral1
Sample
bd440cd10297547dac09ebd75111fc988f4c39c4f405f1db44e0fc7c8f8554cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd440cd10297547dac09ebd75111fc988f4c39c4f405f1db44e0fc7c8f8554cf.exe
Resource
win10v2004-20220812-en
General
-
Target
bd440cd10297547dac09ebd75111fc988f4c39c4f405f1db44e0fc7c8f8554cf
-
Size
47KB
-
MD5
417ff8e436337346f6dc0f8650b087b0
-
SHA1
e4bb351aa8d261b97c1fbc9ee56503319214116c
-
SHA256
bd440cd10297547dac09ebd75111fc988f4c39c4f405f1db44e0fc7c8f8554cf
-
SHA512
8f89cfbb8421f2652061a4ad1869fbb5bdc570aa0e4ed538b161497b0ee85056518b3428d40a84e9b89bd52cf14052fe6b35338e17bde3b0cd1c29a46c52bc37
-
SSDEEP
768:k1/tP13raQNCSSDaXdF+lF7P7J5reaCn+9JO2shY8PLUpb6VPvYqBN6cNFfAXwNm:k1/t0SY+A37feaCMJDmYsLIb4PvYqHBO
Malware Config
Signatures
Files
-
bd440cd10297547dac09ebd75111fc988f4c39c4f405f1db44e0fc7c8f8554cf.exe windows x86
1a3605ecab100f4cf77b04e5c8e1eb92
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetSystemDirectoryA
GetModuleHandleA
GetCurrentDirectoryA
GetWindowsDirectoryA
SetUnhandledExceptionFilter
ExitProcess
user32
SendDlgItemMessageA
GetDlgItem
EnableWindow
KillTimer
LoadIconA
MessageBoxA
MessageBoxIndirectA
PostMessageA
EndDialog
SendMessageA
SetTimer
ShowWindow
DialogBoxParamA
DestroyIcon
AppendMenuA
wsprintfA
GetSystemMenu
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
Sections
.code Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reg Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ