Static task
static1
Behavioral task
behavioral1
Sample
07eda236bb1f25ac7c61bf3340eb50246941927512efee4fff61e1831cc36125.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07eda236bb1f25ac7c61bf3340eb50246941927512efee4fff61e1831cc36125.exe
Resource
win10v2004-20220812-en
General
-
Target
07eda236bb1f25ac7c61bf3340eb50246941927512efee4fff61e1831cc36125
-
Size
16KB
-
MD5
7918a79868813a0a19871ee81afb59c0
-
SHA1
003a747b62f610eeb92e2bd4cad9ac48a3aeda97
-
SHA256
07eda236bb1f25ac7c61bf3340eb50246941927512efee4fff61e1831cc36125
-
SHA512
8ce2bb766d69c5c47d99d7fcc09457d4e4ca67628722353d2d5638bfb2e960183ec3790b54c06644dfdb642067b2cfe0e6899324851676b606ff0db3156dccfc
-
SSDEEP
384:iEccq8SCRdIkXaZx+ZxVrsiERJdpZnWlShc:WLi/92x+rMJjhc
Malware Config
Signatures
Files
-
07eda236bb1f25ac7c61bf3340eb50246941927512efee4fff61e1831cc36125.exe windows x86
3a9367306c18b77e986592eac8088866
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
kernel32
ReadFile
lstrlenA
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
GetModuleFileNameA
GetProcAddress
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
LoadLibraryA
lstrcpyA
SetFilePointer
Sleep
VirtualAlloc
VirtualFree
WriteFile
lstrcatA
shell32
ShellExecuteA
Sections
.text Size: 1024B - Virtual size: 994B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 668B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE