Static task
static1
Behavioral task
behavioral1
Sample
410fd5e1b2d802bb5c636fa9f53bc53128c5b28fe1c5f0159094157c02da1245.exe
Resource
win7-20221111-en
General
-
Target
410fd5e1b2d802bb5c636fa9f53bc53128c5b28fe1c5f0159094157c02da1245
-
Size
124KB
-
MD5
31e83571e499689249ff8bd6903e6453
-
SHA1
085b83941fb0d2fc021ebb50aea2173766bf13a9
-
SHA256
410fd5e1b2d802bb5c636fa9f53bc53128c5b28fe1c5f0159094157c02da1245
-
SHA512
288a52a5452f8c69b2aacdf5b4ba77bf05cf875b0fea8786299a46490cf3739f28b5fa2549fc9d5dd3ed8bcd358576d4ac4a19ee6ae58e1102d8a36d37418552
-
SSDEEP
3072:FpU9ySzTTCCf3flbxww3Io+0OKKeGI3l5sCj:myoTCCfvlzCKKeGG3J
Malware Config
Signatures
Files
-
410fd5e1b2d802bb5c636fa9f53bc53128c5b28fe1c5f0159094157c02da1245.exe windows x86
164cfcac541a7ac8708f5df850d78093
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
lstrcmpA
lstrlenA
lstrcpynA
GetTickCount
WriteFile
GetCommandLineA
lstrcatA
GetLastError
GetProcAddress
VirtualAlloc
GetTempFileNameA
GetLocalTime
LoadLibraryA
OpenMutexA
FindAtomA
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
CloseHandle
GetVersion
GetTempPathA
GetSystemTime
lstrcpyA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualQuery
RtlUnwind
IsDebuggerPresent
user32
GetWindowRect
ClientToScreen
wsprintfA
InflateRect
GetCursorPos
GetCaretPos
EqualRect
IsWindowVisible
GetFocus
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.frdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE