Static task
static1
Behavioral task
behavioral1
Sample
14e140ec1650f50ff528e9614be7a845b406d4a292b50c157e749fad53990165.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14e140ec1650f50ff528e9614be7a845b406d4a292b50c157e749fad53990165.exe
Resource
win10v2004-20220812-en
General
-
Target
14e140ec1650f50ff528e9614be7a845b406d4a292b50c157e749fad53990165
-
Size
305KB
-
MD5
683ee996cb5b28bd1a0b868b029339b6
-
SHA1
b8d6e8a93fe2c713892c2ea1d87de244f0182249
-
SHA256
14e140ec1650f50ff528e9614be7a845b406d4a292b50c157e749fad53990165
-
SHA512
48004e998e21653a756c15afadabf94b3bdbadab079985842b2e206b7143fc6fff29b6955f765c6c0ae10925757bdff79c8d3a61dd34c80e459b263fd917b0d8
-
SSDEEP
6144:xVmGOsFdL/cmEqSlmqotSRBKv/uYn/us4BKLr:xkGOsv/sjfotSRBGuY/us
Malware Config
Signatures
Files
-
14e140ec1650f50ff528e9614be7a845b406d4a292b50c157e749fad53990165.exe windows x86
d7467aae044e60ceaf2310bf27ee258b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetModuleFileNameA
LocalFree
SetLastError
GetModuleHandleA
GetCurrentThreadId
GetConsoleAliasW
FindClose
lstrlenW
GetCurrentProcessId
ReadFile
GetNumberFormatW
TlsGetValue
EnumCalendarInfoW
GetDriveTypeW
EnterCriticalSection
GetPrivateProfileStringW
SetEvent
ResumeThread
HeapCreate
user32
DispatchMessageA
SetFocus
GetKeyboardType
GetCursorInfo
DrawTextA
GetClassInfoA
DispatchMessageA
IsWindow
GetMenuInfo
GetKeyState
CallWindowProcW
GetClientRect
GetSysColor
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ