Static task
static1
Behavioral task
behavioral1
Sample
486b0cf276f4d2322b15b34d8b20cf2cf1da11c33caaec9ad46dd37d259a0d4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
486b0cf276f4d2322b15b34d8b20cf2cf1da11c33caaec9ad46dd37d259a0d4b.exe
Resource
win10v2004-20220812-en
General
-
Target
486b0cf276f4d2322b15b34d8b20cf2cf1da11c33caaec9ad46dd37d259a0d4b
-
Size
82KB
-
MD5
0bc64e3e4cd92ae205f1e8e91c0bef60
-
SHA1
c70057115e023c26046db57c2b6fae06b8745c8c
-
SHA256
486b0cf276f4d2322b15b34d8b20cf2cf1da11c33caaec9ad46dd37d259a0d4b
-
SHA512
d3464f9ac7b79e2dd2b22c003850c61f3f497112057b518d1c41714996372353a1ff110f2c8c5fada22b0cd573fa066f08b3347d33c4c2b3583a42eaa06f4223
-
SSDEEP
1536:GexvaQ7f6k1qcStAYs9zSOY3PlQfhnWakKi3RG1KSEH/:Ge0Q7f6k1mkYfyfhncoo
Malware Config
Signatures
Files
-
486b0cf276f4d2322b15b34d8b20cf2cf1da11c33caaec9ad46dd37d259a0d4b.exe windows x86
c6ca01882067d117c3351bdeca311540
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AppendMenuA
CloseClipboard
CreatePopupMenu
DeleteMenu
EmptyClipboard
GetClipboardData
GetKeyboardState
IsIconic
KillTimer
RegisterClipboardFormatA
SetCaretPos
SetClassLongA
SetClipboardData
SetCursor
SetTimer
ShowCursor
gdi32
ExtFloodFill
ExtSelectClipRgn
ExtTextOutA
ExtTextOutW
FillPath
FillRgn
FixBrushOrgEx
FlattenPath
FloodFill
FrameRgn
GdiComment
GdiDeleteSpoolFileHandle
GdiEndDocEMF
kernel32
ExitProcess
GetLastError
GetModuleHandleA
GetProcAddress
HeapSize
LoadLibraryA
MapViewOfFile
QueryDosDeviceA
UnmapViewOfFile
VirtualAlloc
VirtualFree
Sections
.flat Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE