Static task
static1
Behavioral task
behavioral1
Sample
483b4697af7607a8c438ea821986cc5b5e5df8fd9daa7afdf2f9a0718030ee05.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
483b4697af7607a8c438ea821986cc5b5e5df8fd9daa7afdf2f9a0718030ee05.exe
Resource
win10v2004-20220812-en
General
-
Target
483b4697af7607a8c438ea821986cc5b5e5df8fd9daa7afdf2f9a0718030ee05
-
Size
219KB
-
MD5
81dca6dd41f9f943c801cbdfea9eeca0
-
SHA1
bc0f6bf00b716caa37c3e50d4604fd9050a9210f
-
SHA256
483b4697af7607a8c438ea821986cc5b5e5df8fd9daa7afdf2f9a0718030ee05
-
SHA512
2cc8d244db25e697fa13446d7c5a1d0e96bc5d7eb28c584649f75629e1d60d46eb2dd34c0c04e0b0021427b63d7a657d604f7116b5aa1da37b60ca52a9ce77e8
-
SSDEEP
3072:vjNBSrod9CIF9IOXBj8F4fCmT/QY9akFaLTXlyieaBnyDOEMDELD2XSz3N6eS0g9:vX5jF73fCuHYpjlrBnJAD2XEN6er3qgI
Malware Config
Signatures
Files
-
483b4697af7607a8c438ea821986cc5b5e5df8fd9daa7afdf2f9a0718030ee05.exe windows x86
c5f1e2c930cbbf7abd56f59541a0868a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleHandleW
lstrcpyW
CloseHandle
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetLastError
GetCommandLineW
lstrlenW
CreateFileW
GetVersionExW
user32
RegisterClassW
GetActiveWindow
SetWindowLongW
LoadStringW
SendMessageW
wsprintfW
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegCloseKey
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 208B - Virtual size: 208B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bss Size: 409B - Virtual size: 409B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE