Static task
static1
Behavioral task
behavioral1
Sample
4b19bc76eb57b32c10b34c996057de0e198764d05ad323fcd5f437b3ce3d362c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b19bc76eb57b32c10b34c996057de0e198764d05ad323fcd5f437b3ce3d362c.exe
Resource
win10v2004-20220901-en
General
-
Target
4b19bc76eb57b32c10b34c996057de0e198764d05ad323fcd5f437b3ce3d362c
-
Size
62KB
-
MD5
5a04e26735021553584b259d5144cfc0
-
SHA1
15bc384f082f51a53a1f7b554fa70c8e2d6f4199
-
SHA256
4b19bc76eb57b32c10b34c996057de0e198764d05ad323fcd5f437b3ce3d362c
-
SHA512
f20c119b301820fd89f4dbb75d57295bdb84d2f5096ea7482357371cb9c53d74e3899266ba395585005e76f123e1ec1961b82e928d65e3e25e1a2597a5532c3c
-
SSDEEP
768:eoKrpPQ3AbuN+XJQ2YEBwKtWch+vkH1JYkyEGMAxVmG17DJ74akR4IMEOO:QNyAbekJQ2dfh+6TE7MWmGxN4jqIMB
Malware Config
Signatures
Files
-
4b19bc76eb57b32c10b34c996057de0e198764d05ad323fcd5f437b3ce3d362c.exe windows x86
6fdcff1eab6845e9015811dbaf916a07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
VirtualQuery
GetVolumePathNameA
GetEnvironmentVariableA
FindResourceW
TlsGetValue
Sleep
CloseHandle
GetTimeFormatA
GetModuleHandleA
HeapCreate
lstrlenA
CloseHandle
DeleteFileW
GetStartupInfoA
ResetEvent
CreateEventA
GetCommandLineA
GetCommandLineA
CancelIo
user32
CallWindowProcA
FindWindowA
GetClassInfoA
GetWindowLongA
CreateIcon
IsWindow
GetSysColor
DispatchMessageA
DestroyMenu
IsZoomed
DispatchMessageA
DrawTextW
PeekMessageA
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ctrbuhc Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE