Static task
static1
Behavioral task
behavioral1
Sample
5f007bd670fb614efb5baf32887aed5cbfd900f771c8f9dab902f37ba8de5a94.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f007bd670fb614efb5baf32887aed5cbfd900f771c8f9dab902f37ba8de5a94.exe
Resource
win10v2004-20220812-en
General
-
Target
5f007bd670fb614efb5baf32887aed5cbfd900f771c8f9dab902f37ba8de5a94
-
Size
47KB
-
MD5
849acc18b0ff61989ab92f88c506d620
-
SHA1
cdf8cefe79736260ae52e2a87a29f0781ed8e9a2
-
SHA256
5f007bd670fb614efb5baf32887aed5cbfd900f771c8f9dab902f37ba8de5a94
-
SHA512
43dee2f84d07a7bc24fb4ee4b89a070059d32ffb51455c2497dc68fff153245ed6bfd2b6fcc70b97b92fd313a94f865c4eb8df9337dd2535fd7324b609078fc2
-
SSDEEP
768:4x1/tP1WCSSDaXdF+lF7P7J5reaCn+9JO2shY8PLUpb6VPvYqBN6cNFfAXXGi9GF:4x1/tBSY+A37feaCMJDmYsLIb4PvYqH3
Malware Config
Signatures
Files
-
5f007bd670fb614efb5baf32887aed5cbfd900f771c8f9dab902f37ba8de5a94.exe windows x86
1a3605ecab100f4cf77b04e5c8e1eb92
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetSystemDirectoryA
GetModuleHandleA
GetCurrentDirectoryA
GetWindowsDirectoryA
SetUnhandledExceptionFilter
ExitProcess
user32
SendDlgItemMessageA
GetDlgItem
EnableWindow
KillTimer
LoadIconA
MessageBoxA
MessageBoxIndirectA
PostMessageA
EndDialog
SendMessageA
SetTimer
ShowWindow
DialogBoxParamA
DestroyIcon
AppendMenuA
wsprintfA
GetSystemMenu
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
Sections
.code Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reg Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ