Static task
static1
Behavioral task
behavioral1
Sample
36a903543c61c28e1d12284dd0559e54b63ea5a7415a5e94e728e35e3bf6b558.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
36a903543c61c28e1d12284dd0559e54b63ea5a7415a5e94e728e35e3bf6b558.exe
Resource
win10v2004-20220812-en
General
-
Target
36a903543c61c28e1d12284dd0559e54b63ea5a7415a5e94e728e35e3bf6b558
-
Size
215KB
-
MD5
a12fb6026a127c02183b1b259dca3490
-
SHA1
f31dc911f83b45ab14cf90fc624b216038167a24
-
SHA256
36a903543c61c28e1d12284dd0559e54b63ea5a7415a5e94e728e35e3bf6b558
-
SHA512
b25644e3eadaa584ab5ebcfa6f86da9bb438e757e82672b99ba7b157494fa50b360420681a222e5ce8d0c953ebd1b868ff494d6cb06bda19b3784637515c0352
-
SSDEEP
3072:vjNBSrod9CIF9IOXBj8F4fCmT/QY9akFaLTXlyieaBnyDOEMDELD2XSz3N6eS0gx:vX5jF73fCuHYpjlrBnJAD2XEN6er3qr
Malware Config
Signatures
Files
-
36a903543c61c28e1d12284dd0559e54b63ea5a7415a5e94e728e35e3bf6b558.exe windows x86
c5f1e2c930cbbf7abd56f59541a0868a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleHandleW
lstrcpyW
CloseHandle
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetLastError
GetCommandLineW
lstrlenW
CreateFileW
GetVersionExW
user32
RegisterClassW
GetActiveWindow
SetWindowLongW
LoadStringW
SendMessageW
wsprintfW
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 208B - Virtual size: 208B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 409B - Virtual size: 409B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE