Static task
static1
Behavioral task
behavioral1
Sample
bed7263be863b7beb548c0b65910f8e827ec008260af151caab115e221d6bfc4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bed7263be863b7beb548c0b65910f8e827ec008260af151caab115e221d6bfc4.exe
Resource
win10v2004-20220812-en
General
-
Target
bed7263be863b7beb548c0b65910f8e827ec008260af151caab115e221d6bfc4
-
Size
303KB
-
MD5
6c13339477879360f269888ac5791280
-
SHA1
6af7fe34df326c4f1426160677198fd8eaa9c492
-
SHA256
bed7263be863b7beb548c0b65910f8e827ec008260af151caab115e221d6bfc4
-
SHA512
3b7757544d27c63565b83c1aa358415008a34f78ba0f235456aef23aee38427c56275f872f52ac8fd866e7bf02d7d32d6ab692b08a59679e88d29561c04c1b2a
-
SSDEEP
6144:5IMzbZVPR7I/A7lmnQU+Br2MXfVrjeJtihe0z:5ft7IoS8ktW/z
Malware Config
Signatures
Files
-
bed7263be863b7beb548c0b65910f8e827ec008260af151caab115e221d6bfc4.exe windows x86
3cf648867153f304b4bf1dfdb1fdb301
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetFileAttributesA
GetPriorityClass
ReadConsoleW
ResumeThread
HeapSize
CreateDirectoryA
ResumeThread
GetStdHandle
VirtualProtect
DeleteFileA
CreatePipe
GlobalSize
WriteFile
IsBadReadPtr
GetLocaleInfoA
GetDriveTypeA
GetProcessHeap
SetLocalTime
GetModuleHandleA
GetCommandLineA
SuspendThread
user32
DestroyMenu
SetCursor
PeekMessageA
SetFocus
GetWindowTextW
SetRect
LoadCursorA
GetMessageA
GetWindowLongA
wsprintfA
DrawIcon
GetWindowLongA
DispatchMessageA
els
DllGetClassObject
DllGetClassObject
DllRegisterServer
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE