Static task
static1
Behavioral task
behavioral1
Sample
0e45c677407d48cad640379987577940b51dd7a9a6918ad7cf7bc2a0cc476052.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0e45c677407d48cad640379987577940b51dd7a9a6918ad7cf7bc2a0cc476052.exe
Resource
win10v2004-20220812-en
General
-
Target
0e45c677407d48cad640379987577940b51dd7a9a6918ad7cf7bc2a0cc476052
-
Size
175KB
-
MD5
e529309790036ebd6749a3fc63dcab4c
-
SHA1
b66e52cadaeabd79104820009918a687ace415af
-
SHA256
0e45c677407d48cad640379987577940b51dd7a9a6918ad7cf7bc2a0cc476052
-
SHA512
7cab744044db317fdd23659a2f79febd33853c863768495047be12021dbaf6acb74a8ec2929b2992ea87f4f7a9cac4d74d41e70eb427e6ee90805a60e1659acc
-
SSDEEP
3072:NqYNZ2qdT/UDLeh1nmg7O2NhMF6CRDi47J9GySgWLvm/t6w+Q:NnDdT8DahZmg7O2NhRv4lSgWTm/tJ
Malware Config
Signatures
Files
-
0e45c677407d48cad640379987577940b51dd7a9a6918ad7cf7bc2a0cc476052.exe windows x86
64713be3a0c9536ec0a8bae28e7babe7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetHandleContext
FindAtomW
GetSystemWow64DirectoryW
SetHandleInformation
GlobalFlags
SetPriorityClass
CreateIoCompletionPort
Module32NextW
CreatePipe
HeapDestroy
CopyFileW
ClearCommError
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 59KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 22KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE