Static task
static1
Behavioral task
behavioral1
Sample
4b614ec4ba2277791c94c64eeb80151fbb65ec7dc8083333749d9891fed6e361.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b614ec4ba2277791c94c64eeb80151fbb65ec7dc8083333749d9891fed6e361.exe
Resource
win10v2004-20221111-en
General
-
Target
4b614ec4ba2277791c94c64eeb80151fbb65ec7dc8083333749d9891fed6e361
-
Size
441KB
-
MD5
10adc0d375801678dcfc3852d68d8840
-
SHA1
bf3e1a50a100f54a066fb2324f61f07e7efb4588
-
SHA256
4b614ec4ba2277791c94c64eeb80151fbb65ec7dc8083333749d9891fed6e361
-
SHA512
1c9e308c77df3080bb335065d363955d9e23bf06a7b11e31b2e551d576320aa3bc386aa70c159cdabb142e4bc635cc7fafc793e3b0e46c629f33e1a291eba78b
-
SSDEEP
12288:9WR1NHSYCWIYWkPkpi2bW2mJhrpmKAUKu59p2Z9anP:9Wb1SYCWIYWkPciFx1mKRhLW9aP
Malware Config
Signatures
Files
-
4b614ec4ba2277791c94c64eeb80151fbb65ec7dc8083333749d9891fed6e361.exe windows x86
2a2459bb4110f92f33350e33dc39e9ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFileScatter
CreateNamedPipeA
ole32
EnableHookObject
ntdll
RtlMapSecurityErrorToNtStatus
user32
GetActiveWindow
GetMenuCheckMarkDimensions
GetForegroundWindow
Sections
.text Size: 434KB - Virtual size: 436KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 277B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE