Static task
static1
Behavioral task
behavioral1
Sample
bd54a7781e03f89b9281498cd91507108a50392f96e94eaf108b781bd8cc2588.exe
Resource
win7-20220812-en
General
-
Target
bd54a7781e03f89b9281498cd91507108a50392f96e94eaf108b781bd8cc2588
-
Size
548KB
-
MD5
5341f6aa4710284b9ffc327530b49280
-
SHA1
40f72c59f84e0d5d94cfbd0ebdf1f3717ca5e800
-
SHA256
bd54a7781e03f89b9281498cd91507108a50392f96e94eaf108b781bd8cc2588
-
SHA512
4ce4002cd798485ba1f240d69b7c439135c8dc00d0011b9cfb8428c1e2faee15567c177d749c5f4b8374e0c519b565defdbca9a20d3a4e3fa352d09865b26ab9
-
SSDEEP
12288:huT8phaEhirbo0Vjrg3P+pJ29IhwyfSnI1iRxTrOAEk4OP87tgp1kUgYi:hLGEhirR83Gr2yfSnIEXTrPEsr1Q
Malware Config
Signatures
Files
-
bd54a7781e03f89b9281498cd91507108a50392f96e94eaf108b781bd8cc2588.exe windows x86
3ede871f504dee75b485f08c01cf3ea1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetShortPathNameA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: - Virtual size: 992KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 461KB - Virtual size: 480KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 45KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE