Static task
static1
Behavioral task
behavioral1
Sample
4ebf5a31768b496173a96f7c290eafee5501cb86b7edba604c90ff417904e7eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ebf5a31768b496173a96f7c290eafee5501cb86b7edba604c90ff417904e7eb.exe
Resource
win10v2004-20220812-en
General
-
Target
4ebf5a31768b496173a96f7c290eafee5501cb86b7edba604c90ff417904e7eb
-
Size
365KB
-
MD5
44c82f5004df73e9944a21845d64ecee
-
SHA1
4e0b1175a0c536553a04bc48863df35cab7f2c8c
-
SHA256
4ebf5a31768b496173a96f7c290eafee5501cb86b7edba604c90ff417904e7eb
-
SHA512
f406c46d4cac72497a45921765557b64324eddbf565ae733b455ea09b64a4c1ae11acb2e705086ed8cf60eac70d775aa52f5cb47cdbe56b467eb3bcd9d1216d5
-
SSDEEP
6144:Hc7BvA+j+4CnpCxAE0KPn7dB9Wc7V6qLJIg8ukjODlGzfcdc+pvsCojHViEosmNV:Ho5j3CcxR0e7Uc7MOJIP1WGzUdNiCoj+
Malware Config
Signatures
Files
-
4ebf5a31768b496173a96f7c290eafee5501cb86b7edba604c90ff417904e7eb.exe windows x86
a6dba947b6bbc348318b1988866f26be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
CreateFileA
GlobalFree
CreateProcessA
TlsGetValue
GetACP
FindClose
ReleaseMutex
ExitThread
CloseHandle
HeapCreate
GlobalUnlock
GetTickCount
PulseEvent
DeleteAtom
SetLastError
CreateMutexA
GetModuleHandleA
GetEnvironmentVariableA
FindResourceA
user32
CallWindowProcA
DefWindowProcW
IsWindow
DrawMenuBar
CheckRadioButton
GetIconInfo
GetDC
CopyRect
DrawEdge
SetFocus
GetDlgItem
DispatchMessageA
FillRect
msasn1
ASN1BERDecBool
ASN1BERDecNull
ASN1BERDecCheck
ASN1BEREncEoid
ASN1BEREncBool
dpnet
DirectPlay8Create
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 356KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ