Static task
static1
Behavioral task
behavioral1
Sample
7ae29bd758e755b87eb22902409c4f8a6887050cfdd1daccbf728680bde2ca10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ae29bd758e755b87eb22902409c4f8a6887050cfdd1daccbf728680bde2ca10.exe
Resource
win10v2004-20220901-en
General
-
Target
7ae29bd758e755b87eb22902409c4f8a6887050cfdd1daccbf728680bde2ca10
-
Size
102KB
-
MD5
939b58ad877ecf0da0896be317ae4be0
-
SHA1
023486cd1ec12e2d74e0e7cf216f98af3699bc6e
-
SHA256
7ae29bd758e755b87eb22902409c4f8a6887050cfdd1daccbf728680bde2ca10
-
SHA512
f253c41132c2456cd4f69d238a111a151040ca20ff2448d4dbb701c099070c2a4c4f6081d9275232367013de92558ac01150fc529136f0acdc4ce70d4f885b48
-
SSDEEP
384:f88hO/JM+9opgDdCiFCCF5mueomOZqIWHa6RhjHMX6SM4Z/L3sPxmdnUTb:ETK+JCiF1F5eOZqf66fHMqSbz3exmE
Malware Config
Signatures
Files
-
7ae29bd758e755b87eb22902409c4f8a6887050cfdd1daccbf728680bde2ca10.exe windows x86
e2f53c035d87c43c6cf0184d4883168e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
HeapDestroy
GetModuleHandleA
CancelIo
DeleteFileW
GetCommandLineA
GetStartupInfoA
CloseHandle
VirtualQuery
Sleep
ResetEvent
CreateEventA
GetVolumePathNameA
GetTimeFormatA
FindResourceW
GetCommandLineA
TlsGetValue
CloseHandle
lstrlenA
GetEnvironmentVariableA
user32
FindWindowA
DestroyMenu
GetSysColor
CallWindowProcA
IsZoomed
DispatchMessageA
IsWindow
GetClassInfoA
DrawTextW
CreateIcon
PeekMessageA
DispatchMessageA
GetWindowLongA
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 94KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE