Static task
static1
Behavioral task
behavioral1
Sample
5d5c638b22de23e70fc1d4d20e61636a40aebdbc12b7b74200d81cb8d6fa2e5e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d5c638b22de23e70fc1d4d20e61636a40aebdbc12b7b74200d81cb8d6fa2e5e.exe
Resource
win10v2004-20220812-en
General
-
Target
5d5c638b22de23e70fc1d4d20e61636a40aebdbc12b7b74200d81cb8d6fa2e5e
-
Size
75KB
-
MD5
0cac97ff9c49b79290631e858e983503
-
SHA1
d3ce3755d586d393da60f6d2156f4ee862419dd2
-
SHA256
5d5c638b22de23e70fc1d4d20e61636a40aebdbc12b7b74200d81cb8d6fa2e5e
-
SHA512
d529355ebd7265d1c4818b2a39e5d6eea499b92788228b503fe455c2eb5d9baa4d348496295c47f7a98fca543a2b7302216690daf9fee793ba54dc817d17c604
-
SSDEEP
1536:xS7F7SVt10xJxflLkXiQ8peDNdSHM+vlkgmqBE00bjM+WK:x0QtkLkXi/kdmd3TqpWK
Malware Config
Signatures
Files
-
5d5c638b22de23e70fc1d4d20e61636a40aebdbc12b7b74200d81cb8d6fa2e5e.exe windows x86
b6f39cabe46151cdfc8b907192e1bca2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
GetShortPathNameA
DeleteFileW
RtlMoveMemory
DeleteFileA
GetProcAddress
LocalFileTimeToFileTime
GetModuleHandleA
GetModuleFileNameA
ExitProcess
VirtualProtect
IsDebuggerPresent
GetEnvironmentStringsW
GetCurrentProcess
lstrcatA
GetCurrentThread
IsDBCSLeadByte
InterlockedDecrement
RaiseException
SizeofResource
GetModuleFileNameW
GetLastError
LoadResource
GetFileAttributesA
GetTempPathA
FileTimeToLocalFileTime
SetFileAttributesA
FreeEnvironmentStringsW
GetThreadLocale
CompareStringA
msvcrt
_controlfp
_initterm
__p___initenv
__getmainargs
__set_app_type
__p__commode
__p__fmode
_adjust_fdiv
_except_handler3
_XcptFilter
_exit
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ