Static task
static1
Behavioral task
behavioral1
Sample
04f584e6f7c86cd76e1fe24ae218828bbfae030f4db8347c81480cafb07a287b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
04f584e6f7c86cd76e1fe24ae218828bbfae030f4db8347c81480cafb07a287b.exe
Resource
win10v2004-20220812-en
General
-
Target
04f584e6f7c86cd76e1fe24ae218828bbfae030f4db8347c81480cafb07a287b
-
Size
45KB
-
MD5
1112497b6d7dd4871bf8db75c6bc09e0
-
SHA1
32925b1ccc5d48bcca4553232607fdbd85bf4dbb
-
SHA256
04f584e6f7c86cd76e1fe24ae218828bbfae030f4db8347c81480cafb07a287b
-
SHA512
7300032ee0ed0f723f958c7630b0aae5c266fb74bf165dac3f791c59bf81fbf8e5c48d9e1ad954d15c6f96e35b71a61fdc27a178a0544abd4c97dba87e1f2310
-
SSDEEP
768:oFZJe9/4KdCSSDaXdF+lF7P7J5reaCn+9JO2shY8PLUpb6VPvYqBN6cNFfAXwNs:uZJS78SY+A37feaCMJDmYsLIb4PvYqHG
Malware Config
Signatures
Files
-
04f584e6f7c86cd76e1fe24ae218828bbfae030f4db8347c81480cafb07a287b.exe windows x86
1a3605ecab100f4cf77b04e5c8e1eb92
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetSystemDirectoryA
GetModuleHandleA
GetCurrentDirectoryA
GetWindowsDirectoryA
SetUnhandledExceptionFilter
ExitProcess
user32
SendDlgItemMessageA
GetDlgItem
EnableWindow
KillTimer
LoadIconA
MessageBoxA
MessageBoxIndirectA
PostMessageA
EndDialog
SendMessageA
SetTimer
ShowWindow
DialogBoxParamA
DestroyIcon
AppendMenuA
wsprintfA
GetSystemMenu
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
Sections
.code Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reg Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ