Static task
static1
Behavioral task
behavioral1
Sample
5d8ef514451c61baf1dd43c5b32838b0e8790a283930009fd4aa799167b6ab83.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d8ef514451c61baf1dd43c5b32838b0e8790a283930009fd4aa799167b6ab83.exe
Resource
win10v2004-20220812-en
General
-
Target
5d8ef514451c61baf1dd43c5b32838b0e8790a283930009fd4aa799167b6ab83
-
Size
85KB
-
MD5
8051aa20c5bb81819cb21aa7f30f4110
-
SHA1
15e1dda1fc609bdeadc3e31c1be17095af83aaed
-
SHA256
5d8ef514451c61baf1dd43c5b32838b0e8790a283930009fd4aa799167b6ab83
-
SHA512
9c2d2b5448e803b5a4248cf29734b2eab77cd06099b798751f30d5e837eda2005e1ebb8c50cb37f0f347d455dd2d7c3e469d9a3e9d9355799679f37e2be3d2ff
-
SSDEEP
1536:f4zRxqfKlHQSgAG7gOD/S9JU7VepcbxSn7iRUnMV:faXquJS7gOTS8dnR
Malware Config
Signatures
Files
-
5d8ef514451c61baf1dd43c5b32838b0e8790a283930009fd4aa799167b6ab83.exe windows x86
d199945442655c8b8afd7e987b6ceaa1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
CreatePipe
SetEndOfFile
IsBadReadPtr
HeapSize
ResumeThread
CreateDirectoryA
GetProcessHeap
DeleteFileA
GetLocaleInfoA
GetPriorityClass
ResumeThread
GetFileAttributesW
WriteFile
GlobalSize
VirtualProtect
GetDriveTypeA
GetCommandLineA
GetStdHandle
SuspendThread
ReadConsoleW
user32
SetCursor
DestroyMenu
GetWindowTextW
PeekMessageA
wsprintfA
GetWindowLongA
GetWindowLongA
DrawIcon
DestroyIcon
GetScrollInfo
DispatchMessageA
SetRect
LoadCursorA
els
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE