Static task
static1
Behavioral task
behavioral1
Sample
7e45ab6fe553c016217836366688562d23877e7b07ae3184b235bcc7a59feba6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7e45ab6fe553c016217836366688562d23877e7b07ae3184b235bcc7a59feba6.exe
Resource
win10v2004-20220812-en
General
-
Target
7e45ab6fe553c016217836366688562d23877e7b07ae3184b235bcc7a59feba6
-
Size
6.0MB
-
MD5
da209718f0494b18cbb1208aef3bb1fe
-
SHA1
e438ec1dd78fdc903eb95f83ebb201e242aa4c88
-
SHA256
7e45ab6fe553c016217836366688562d23877e7b07ae3184b235bcc7a59feba6
-
SHA512
a746a05988d1ea4be5f3d18ce7ecd7ede9f23f710762ccc8c90846716915b8cc2ef5c87831224959a7a4f729beeb606a3af80fc87bf23421bda72a0eeefc30a9
-
SSDEEP
98304:X40e9FbTV06zr4KCKzy5gEOOg8R4UzeoTPXZlYGIynWCQJTpmBQy+hKRtrnkrx60:XJeHbGSMKBu5gEOOg8RPzFTxlXI0DpAZ
Malware Config
Signatures
Files
-
7e45ab6fe553c016217836366688562d23877e7b07ae3184b235bcc7a59feba6.exe windows x86
bb763069b83ccf653544c06c7741673a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutWrite
ws2_32
accept
kernel32
SetLastError
user32
IsDialogMessageA
gdi32
EndPage
winspool.drv
OpenPrinterA
comdlg32
GetFileTitleA
advapi32
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
ole32
ReleaseStgMedium
oleaut32
UnRegisterTypeLi
comctl32
ImageList_Destroy
wldap32
ord29
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 5.2MB - Virtual size: 9.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 756KB - Virtual size: 756KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ