Static task
static1
Behavioral task
behavioral1
Sample
f43d807a5b4be2ea741925c18a7813d9a2ac9483ac69d8c3fbe441fcd96daf71.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f43d807a5b4be2ea741925c18a7813d9a2ac9483ac69d8c3fbe441fcd96daf71.exe
Resource
win10v2004-20220812-en
General
-
Target
f43d807a5b4be2ea741925c18a7813d9a2ac9483ac69d8c3fbe441fcd96daf71
-
Size
359KB
-
MD5
545516f5fdc2b1e3a50d99a444d37c9a
-
SHA1
4df9f7aea80904cb6e3195893a5be336401d59cb
-
SHA256
f43d807a5b4be2ea741925c18a7813d9a2ac9483ac69d8c3fbe441fcd96daf71
-
SHA512
c2734e3621224d0d6201740c238fcf1a73065ffca7586a1eab3f40646955978b344cfd29f46899575e56c560b2cf41812322b7c074a355b3a994ca4b95b08aa3
-
SSDEEP
6144:j3K1HxSlGPQBaZ+BqhMXAy6fYv2SeJ3eB8fvmKNNcQ5ta6gKv5R3L/XWlpWzsVVT:j3K1R9QI0Ay6fYvzEOe2KNSQ6l83zBzk
Malware Config
Signatures
Files
-
f43d807a5b4be2ea741925c18a7813d9a2ac9483ac69d8c3fbe441fcd96daf71.exe windows x86
7e287540df3ef56df9aeddbf639babc9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
lstrlenA
GetTickCount
GetTickCount
ExitProcess
GetDiskFreeSpaceW
CreateFileA
GetModuleHandleW
GetFileAttributesA
LoadLibraryA
FindAtomW
ReleaseMutex
HeapCreate
GetComputerNameW
ReleaseMutex
GetSystemTime
ResetEvent
GetDriveTypeA
GetCommandLineW
CloseHandle
user32
DestroyCaret
GetCaretPos
GetMenu
CreateWindowExA
CloseWindow
DrawStateA
CallWindowProcA
FillRect
GetClassInfoA
EndDialog
DispatchMessageA
GetComboBoxInfo
GetDlgItem
rasapi32
RasDeleteEntryA
DwCloneEntry
DwEnumEntryDetails
RasDialA
DwRasUninitialize
modemui
CountryRunOnce
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ