Static task
static1
Behavioral task
behavioral1
Sample
3490928a6c225b0ad860507b96dc5da99cfe86c45637bd0af9e22af61d054d0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3490928a6c225b0ad860507b96dc5da99cfe86c45637bd0af9e22af61d054d0f.exe
Resource
win10v2004-20220812-en
General
-
Target
3490928a6c225b0ad860507b96dc5da99cfe86c45637bd0af9e22af61d054d0f
-
Size
1KB
-
MD5
0d659de2643cc4adf422a59881072f20
-
SHA1
2b62cbe648971d2e7113b270c6c82be172f31a7b
-
SHA256
3490928a6c225b0ad860507b96dc5da99cfe86c45637bd0af9e22af61d054d0f
-
SHA512
e1ea248636b7a853ecea71cb349439e27d0a6a018735cda8017302997504883b2d024e153fef2bef50fbf1400c5b39cc0c98956b38a9ad2812ad7762887f2706
Malware Config
Signatures
Files
-
3490928a6c225b0ad860507b96dc5da99cfe86c45637bd0af9e22af61d054d0f.exe windows x86
ab5f42a907273006d5b287df90d3a0ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateRemoteThread
ExitProcess
GetModuleHandleA
OpenProcess
Sleep
VirtualAllocEx
VirtualFreeEx
WinExec
WriteProcessMemory
urlmon
URLDownloadToFileA
user32
FindWindowA
GetWindowThreadProcessId
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE