Static task
static1
Behavioral task
behavioral1
Sample
fa8d558be32ed84fa65fda27b16e926a84eb176a61fd386c934ff4aa0f496bad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa8d558be32ed84fa65fda27b16e926a84eb176a61fd386c934ff4aa0f496bad.exe
Resource
win10v2004-20220812-en
General
-
Target
fa8d558be32ed84fa65fda27b16e926a84eb176a61fd386c934ff4aa0f496bad
-
Size
325KB
-
MD5
7068b79e1df68b4b325a2d568864fadc
-
SHA1
f61349053a1f7da381a67fb8833ca2e20faf599d
-
SHA256
fa8d558be32ed84fa65fda27b16e926a84eb176a61fd386c934ff4aa0f496bad
-
SHA512
4a8d5e2b31a396752e43d0c2182d95db252cd9f1ba1ab7185d7f8a11718908524a92d4c338c94a94caf3770bc1eabf79cc9cbe4925ca279f6818e49ec644b9c8
-
SSDEEP
6144:ED8hbtWbib3+eKwvzSnlgmzepMqRj7nlrIcgmmxdvFTWrVvTKgHEv1wNM7Fh0ohP:fhRuIOeKwvzSn6mzQMKnlrIcgbZFSrH8
Malware Config
Signatures
Files
-
fa8d558be32ed84fa65fda27b16e926a84eb176a61fd386c934ff4aa0f496bad.exe windows x86
9ca0eacef34812c6b91caea3373d6063
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ntdll
RtlUnlockMemoryStreamRegion
RtlEnlargedIntegerMultiply
user32
GetDCEx
advapi32
ConvertStringSidToSidW
gdi32
SetBkMode
SelectPalette
SelectFontLocal
ResizePalette
SetPixel
PathToRegion
GetROP2
GetDeviceCaps
GetDCPenColor
DeleteObject
CreateSolidBrush
RemoveFontResourceA
CloseFigure
CreateDIBPatternBrushPt
CreateHatchBrush
CreateScalableFontResourceW
shell32
SHExtractIconsW
shlwapi
PathStripPathA
PathUnmakeSystemFolderW
SHDeleteKeyW
advpack
GetVersionFromFileEx
Sections
.text Size: 232KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 401KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ