Static task
static1
Behavioral task
behavioral1
Sample
4ad0e645ac18923b4cb692b1caeeff5bfc4373732c41684375dc27a05b0af808.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ad0e645ac18923b4cb692b1caeeff5bfc4373732c41684375dc27a05b0af808.exe
Resource
win10v2004-20220901-en
General
-
Target
4ad0e645ac18923b4cb692b1caeeff5bfc4373732c41684375dc27a05b0af808
-
Size
44KB
-
MD5
099acf4738d916bb1fdf64e6a7ec8250
-
SHA1
5906c45d7c253e47cfbfbf8d122de91525c9dc36
-
SHA256
4ad0e645ac18923b4cb692b1caeeff5bfc4373732c41684375dc27a05b0af808
-
SHA512
d8886c0a6bd3c3dcc17cd5e491b42ccae991bcf4e88b00d70a711650ee6c8be87f84527931c773ab61177db4f75f923025311e2c9482117e9947b88ec2481142
-
SSDEEP
768:hip3LFLwArGoHwiA/lDXKCSNuaswljNUTHkHL4gA:hipO+cXKCSNuaswljNQHO9A
Malware Config
Signatures
Files
-
4ad0e645ac18923b4cb692b1caeeff5bfc4373732c41684375dc27a05b0af808.exe windows x86
9285ce54b0e25ddb919109877db426ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadStringA
PostQuitMessage
DialogBoxParamA
DestroyWindow
DefWindowProcA
PostMessageA
SendMessageA
RegisterClassExA
LoadCursorA
LoadIconA
DispatchMessageA
TranslateMessage
GetMessageA
SetFocus
EndDialog
CreateWindowExA
kernel32
LoadLibraryA
GetModuleHandleA
lstrcpyA
GetModuleFileNameA
SleepEx
GetLastError
GetStartupInfoA
GetCurrentProcess
InitializeCriticalSection
CompareStringW
ReplaceFileA
RemoveDirectoryA
CopyFileA
SetFileAttributesA
msvcrt
_XcptFilter
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__acmdln
exit
_exit
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ