Static task
static1
Behavioral task
behavioral1
Sample
4525bfa22252e3028ccf3c663263afc2e96c613982d580e7eb02eb4543f5916a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4525bfa22252e3028ccf3c663263afc2e96c613982d580e7eb02eb4543f5916a.exe
Resource
win10v2004-20220812-en
General
-
Target
4525bfa22252e3028ccf3c663263afc2e96c613982d580e7eb02eb4543f5916a
-
Size
303KB
-
MD5
6442f5dff0442a0bd77977f7e270efa0
-
SHA1
d370e4755013458f7f6f149a4c17f66536769cbd
-
SHA256
4525bfa22252e3028ccf3c663263afc2e96c613982d580e7eb02eb4543f5916a
-
SHA512
f2ab3af85f1353895b98171a10989cc6ecaae409c98f1fd8a9a6c6179c8d91f8b6277a507ddbbb08dcd889f6da41967818d330704047dcf13df650df4f5f4a85
-
SSDEEP
6144:nMzbtBAV7X3deuRO2O4nq/G2wmekAXs8FKjPL:MlBAVZeCFOUq/smeKfb
Malware Config
Signatures
Files
-
4525bfa22252e3028ccf3c663263afc2e96c613982d580e7eb02eb4543f5916a.exe windows x86
eb9be30c6321adec4d5dea34540f6fbc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SuspendThread
ResumeThread
SetEndOfFile
GlobalSize
CreatePipe
GetLocaleInfoA
VirtualProtect
DeleteFileA
HeapSize
lstrlenA
IsBadReadPtr
WriteFile
GetStdHandle
GetProcessHeap
GetPriorityClass
GetFileAttributesW
GetModuleHandleA
GetDriveTypeA
GetCommandLineA
CreateDirectoryA
ReadConsoleA
user32
LoadCursorA
DrawIcon
DestroyMenu
GetWindowLongA
GetWindowLongA
DispatchMessageA
SetCursor
GetWindowTextW
wsprintfA
GetScrollInfo
DestroyIcon
PeekMessageA
SetRect
els
DllGetClassObject
DllUnregisterServer
DllCanUnloadNow
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE