Static task
static1
Behavioral task
behavioral1
Sample
457af52410d54d0643f98e68f1b793549d806580d424f8041910f5d25e046ecf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
457af52410d54d0643f98e68f1b793549d806580d424f8041910f5d25e046ecf.exe
Resource
win10v2004-20220812-en
General
-
Target
457af52410d54d0643f98e68f1b793549d806580d424f8041910f5d25e046ecf
-
Size
305KB
-
MD5
f35703fce2b7bc88b0a5ddf8949dea3e
-
SHA1
cf861fe1c34e343cd1beb5294a386eb26c4f7890
-
SHA256
457af52410d54d0643f98e68f1b793549d806580d424f8041910f5d25e046ecf
-
SHA512
01669c8ed117cb3e1ca85ca70fd7e06cb1a4ca38d13b080f7f0c87f24df464b01ad4479cb14e754ca3ce828e96fb04a4d761d9815c022926688fcdc1e8231b0b
-
SSDEEP
6144:4+Z9V+kma8YiOz7YbIchogLn9hkWBxoVNG278ugrrS75dDtFoN:bVwazz839XpeVNG2wDu7vk
Malware Config
Signatures
Files
-
457af52410d54d0643f98e68f1b793549d806580d424f8041910f5d25e046ecf.exe windows x86
acebcd3e4868556866e9e808173956b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetEnvironmentVariableA
DeleteFileA
GetStartupInfoW
CreateMutexW
ReleaseMutex
HeapSize
GetTickCount
FindClose
CloseHandle
HeapCreate
GetFileSize
HeapDestroy
InitializeCriticalSection
ResetEvent
SetEndOfFile
AddAtomA
GetModuleHandleA
WaitForSingleObject
GetTickCount
GetProfileIntW
GetCurrentDirectoryA
CreateFileA
ExitProcess
SuspendThread
shell32
SHGetDiskFreeSpaceA
ShellAboutA
DragAcceptFiles
ShellMessageBoxA
DragFinish
ExtractIconA
SHGetSettings
SHGetMalloc
DuplicateIcon
SHFree
DllUnregisterServer
StrChrA
DragQueryFileA
dpmodemx
SPInit
SPInit
SPInit
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 298KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ