Static task
static1
Behavioral task
behavioral1
Sample
13fe7f475074417d5ad98ecb3a97f6fde803ab3d7e4e80cf807dccca8ac8fd76.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13fe7f475074417d5ad98ecb3a97f6fde803ab3d7e4e80cf807dccca8ac8fd76.exe
Resource
win10v2004-20220812-en
General
-
Target
13fe7f475074417d5ad98ecb3a97f6fde803ab3d7e4e80cf807dccca8ac8fd76
-
Size
752KB
-
MD5
22a46cd7d1e9b68f4d1980503adec5b8
-
SHA1
90ada0bb85d5163efc774bf0e932938a4115af73
-
SHA256
13fe7f475074417d5ad98ecb3a97f6fde803ab3d7e4e80cf807dccca8ac8fd76
-
SHA512
475728496587fc4ebe52eba4bcee00fa7f3aeea2b783e36b80e97a3509b69743aad01d8ee081618e49eadf574ada8b8740ba80c125c7093cb9937943d212be7a
-
SSDEEP
12288:GoDN0+vD/DEoxtG8n27wpgyX4Dbsx/qfbjH1f/wJQFhjsJ2ki/YdTb824fw5GL:5N0I/bxz1D4DbsyfHQJ2kdTkfwML
Malware Config
Signatures
Files
-
13fe7f475074417d5ad98ecb3a97f6fde803ab3d7e4e80cf807dccca8ac8fd76.exe windows x86
35cf14293df733384f9e67601b2d1ed6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
HeapCreate
CreateSemaphoreW
GetVersion
SetEvent
ExitProcess
HeapDestroy
GetModuleHandleA
SuspendThread
ReleaseMutex
OpenEventW
DeleteFileA
GetCommandLineW
FindResourceExA
CloseHandle
GetEnvironmentVariableW
lstrlenW
WriteConsoleA
CloseHandle
GetStartupInfoA
user32
GetKeyState
PeekMessageA
GetSysColor
CreateIcon
SetFocus
FindWindowA
IsZoomed
DispatchMessageA
DrawTextW
GetClassInfoA
DispatchMessageA
CallWindowProcW
GetWindowLongA
docprop
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ