Static task
static1
Behavioral task
behavioral1
Sample
50399a0e1ac6248a1dbb4a66f35f9be50f214f6d67b4b7894cfa3639e9761a48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
50399a0e1ac6248a1dbb4a66f35f9be50f214f6d67b4b7894cfa3639e9761a48.exe
Resource
win10v2004-20220812-en
General
-
Target
50399a0e1ac6248a1dbb4a66f35f9be50f214f6d67b4b7894cfa3639e9761a48
-
Size
20KB
-
MD5
40d18e1ab1cd89773290a8c17084e380
-
SHA1
0bd9067fd41c412ce4c2cae31b9e39c43974d9c4
-
SHA256
50399a0e1ac6248a1dbb4a66f35f9be50f214f6d67b4b7894cfa3639e9761a48
-
SHA512
ad0943b575545d81b981a8e6636682cde32d99d257cc7d95115d5e4c5091f67bdf323026299e6f82b0cccad58629c50754b001b337c741488eb66799154241d6
-
SSDEEP
192:YO7XTRnRflKJCtPQYFN5WatIg50wlL1gxSq11bNNvIDs0WDyBjI59ZZXmUwKN+:YO7XTRnFcLY503dNwmoI59ZZOKN+
Malware Config
Signatures
Files
-
50399a0e1ac6248a1dbb4a66f35f9be50f214f6d67b4b7894cfa3639e9761a48.exe windows x86
6cd4594e4a61fd421c0468f57a0273a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ord497
ord775
ord490
ord374
ord429
ord781
ord766
ord686
ord321
ord461
ord465
ord713
ord714
ord463
ord352
ord395
ord289
ord214
ord271
ord306
ord592
ord704
ord350
ord268
ord276
ord740
ord269
ord323
ord729
ord282
ord361
ord654
ord334
ord397
ord464
user32
ord453
ord614
ord229
ord490
ord231
ord291
gdi32
ord249
comctl32
ord84
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 823B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 526B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE