Static task
static1
Behavioral task
behavioral1
Sample
bdd2be7ac6948501dd272ff5ad796f5dd7ee6e8c31c6d4cd879ae5b1f23b4435.exe
Resource
win7-20220901-en
General
-
Target
bdd2be7ac6948501dd272ff5ad796f5dd7ee6e8c31c6d4cd879ae5b1f23b4435
-
Size
342KB
-
MD5
a1a0d8f4c3b33257047a52338e3a2bda
-
SHA1
0c9d42c0b2779a3f6a923f1055d9c7b58104a295
-
SHA256
bdd2be7ac6948501dd272ff5ad796f5dd7ee6e8c31c6d4cd879ae5b1f23b4435
-
SHA512
eda9c126f8fcb771926e7731d557b1e901c6e9c68aee7664f3c9af297b839b896701320a872a37ce7f8c6dcfd3f53d6dedde652169453e9b34443e5570fb49ef
-
SSDEEP
6144:Fu+9NIamWyDsNM4whEzLkP+F4l1UF+VNkKgFJMTJC6RFI4:Fu+LLgEzYP+F4lzN7I4
Malware Config
Signatures
Files
-
bdd2be7ac6948501dd272ff5ad796f5dd7ee6e8c31c6d4cd879ae5b1f23b4435.exe windows x86
3ede871f504dee75b485f08c01cf3ea1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetShortPathNameA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 259KB - Virtual size: 472KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 45KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE