Static task
static1
Behavioral task
behavioral1
Sample
04805db07ad36b2a297adedd247ef3987549763e5cc9120c84b524dccdd4c95b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
04805db07ad36b2a297adedd247ef3987549763e5cc9120c84b524dccdd4c95b.exe
Resource
win10v2004-20220812-en
General
-
Target
04805db07ad36b2a297adedd247ef3987549763e5cc9120c84b524dccdd4c95b
-
Size
250KB
-
MD5
8134a391b715b8fd4ef1c6557b77e3d3
-
SHA1
3c589a7e00933f5d748310d39ac4ca5971842af7
-
SHA256
04805db07ad36b2a297adedd247ef3987549763e5cc9120c84b524dccdd4c95b
-
SHA512
252848c299228c8a3a57240e0f6037f087ed0d9a41154d669f862d3e3930dc065d2c432a0e37b34bc0205ea2bc9f231e83af89834d36b4b05d3800a24425079f
-
SSDEEP
3072:REEK/q+xpJAlVEb3ziga1c1TjJPkMmU+QAfNc:L8fpGQbegzKMaQAf
Malware Config
Signatures
Files
-
04805db07ad36b2a297adedd247ef3987549763e5cc9120c84b524dccdd4c95b.exe windows x86
936e7a611aa8e3172e20c6cf6d0a1f77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
FindNextFileW
FlushFileBuffers
GetExitCodeProcess
GetFileTime
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
HeapCreate
InterlockedIncrement
IsDebuggerPresent
LoadLibraryA
LocalFree
MultiByteToWideChar
TlsGetValue
VirtualAlloc
VirtualFree
user32
GetActiveWindow
GetDesktopWindow
GetDlgItem
GetForegroundWindow
GetWindow
UnregisterClassA
gdi32
RestoreDC
SetTextColor
SetViewportExtEx
shell32
DragFinish
ExtractIconA
SHCreateDirectoryExW
SHGetFileInfo
SHGetPathFromIDListA
SHGetSpecialFolderPathA
ShellExecuteEx
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE