Static task
static1
Behavioral task
behavioral1
Sample
47586bf2422bd334694690f05857b6f503de8f7fd0176e3dc1adf19b7047b692.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47586bf2422bd334694690f05857b6f503de8f7fd0176e3dc1adf19b7047b692.exe
Resource
win10v2004-20220812-en
General
-
Target
47586bf2422bd334694690f05857b6f503de8f7fd0176e3dc1adf19b7047b692
-
Size
85KB
-
MD5
11ca8e2c24a8fa46a148c04707283020
-
SHA1
55641d7efe8b223a7e4c09416de511b3b92977b8
-
SHA256
47586bf2422bd334694690f05857b6f503de8f7fd0176e3dc1adf19b7047b692
-
SHA512
5d62bdd6cb52b54b06ec06c0cf6a48c860681daabe096d7825f4d4e786caa2ed382a80f8de5bbd6ead84cc64b688c8789d88f5aba8c085e743d0c3392588bcbc
-
SSDEEP
1536:2d7bXSMx7AWyZ6JicrOXGkVyeK/Kz26RLQnVbZed:2tbSZWSVyeKYvZQpZA
Malware Config
Signatures
Files
-
47586bf2422bd334694690f05857b6f503de8f7fd0176e3dc1adf19b7047b692.exe windows x86
9c083cf7313d1abc9dc567c99ff03928
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
GetDriveTypeA
GlobalSize
SuspendThread
IsBadReadPtr
GetFileAttributesW
CreateDirectoryA
GetLocaleInfoA
SetEndOfFile
VirtualProtect
GetStdHandle
GetCommandLineA
GetPriorityClass
ResumeThread
ReadConsoleA
HeapSize
GetModuleHandleA
DeleteFileA
lstrlenA
CreatePipe
WriteFile
user32
wsprintfA
DrawIcon
GetScrollInfo
GetWindowTextW
GetWindowLongA
GetWindowLongA
PeekMessageA
LoadCursorA
DispatchMessageA
DestroyIcon
SetRect
DestroyMenu
SetCursor
els
DllCanUnloadNow
DllRegisterServer
DllGetClassObject
DllUnregisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE