Static task
static1
Behavioral task
behavioral1
Sample
b01863dd84af3d4a9dcc552952e74d54e2a90c72b65a395df82f2f2142870430.exe
Resource
win7-20220812-en
General
-
Target
b01863dd84af3d4a9dcc552952e74d54e2a90c72b65a395df82f2f2142870430
-
Size
580KB
-
MD5
0f18a0e8512d57c021d9748039d98a72
-
SHA1
f031c28b1a007561497615e1f2a5a1dd2bbed3e3
-
SHA256
b01863dd84af3d4a9dcc552952e74d54e2a90c72b65a395df82f2f2142870430
-
SHA512
c7b94c6cdb68e3cef2c990c505093ab2dc91eabb74fa1033ce83134ef28be8eccbad944188977c2d1ce48a1de70705e3d72b34ba27d3737eb54d8fd2f240275a
-
SSDEEP
12288:HBhyJQAtUEiF79DHzBrQiUtdDQP7stw7oUyBLoD15HjUXnyNDAAf:HBEJAEiF74iU/DQPqOU3yhz
Malware Config
Signatures
Files
-
b01863dd84af3d4a9dcc552952e74d54e2a90c72b65a395df82f2f2142870430.exe windows x86
00d0055b10b9f24b4fceb5f3f92d56b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitProcess
GetModuleHandleA
user32
GetKeyboardType
advapi32
RegQueryValueExA
oleaut32
SysFreeString
version
VerQueryValueA
gdi32
UnrealizeObject
ole32
OleUninitialize
comctl32
ImageList_SetIconSize
shell32
SHGetSpecialFolderLocation
wsock32
WSACleanup
Sections
pec1 Size: 564KB - Virtual size: 984KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pec Size: 1KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE