Static task
static1
Behavioral task
behavioral1
Sample
c5e845020bd936b446ff49fbdffbe539f568285793fc5c606eeebfa7459a719e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c5e845020bd936b446ff49fbdffbe539f568285793fc5c606eeebfa7459a719e.exe
Resource
win10v2004-20220812-en
General
-
Target
c5e845020bd936b446ff49fbdffbe539f568285793fc5c606eeebfa7459a719e
-
Size
25KB
-
MD5
0b0440c58f645eb741feb8d522907a10
-
SHA1
6eebab4f050f8f59c30604997f26c03f728a7def
-
SHA256
c5e845020bd936b446ff49fbdffbe539f568285793fc5c606eeebfa7459a719e
-
SHA512
2feb729dd9f4cb7a6b36d2bcf2cfd4052fa82bc325d2153c7391c7825763e6de6cd1f1b028584da0ff3a82035be6199a2fd7b2efda99a6775af4991c08c9d078
-
SSDEEP
384:Fg0EvlsVf4kWkJ7WoagGDYgKzkw33U3ycPHqVnY7LN1RpfLEIQOlojKXP6WY7:KXWAw3aQd5HCrPIYHN1+OlojKy
Malware Config
Signatures
Files
-
c5e845020bd936b446ff49fbdffbe539f568285793fc5c606eeebfa7459a719e.exe windows x86
d9e9733c9e3bca17da8124ddf2ba24a7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpW
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
Sleep
InterlockedExchange
UnhandledExceptionFilter
msvcrt
_controlfp
_except_handler4_common
__wgetmainargs
_cexit
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_exit
pnpui
SimplifiedDINotificationW
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE