Static task
static1
Behavioral task
behavioral1
Sample
7da4d39865795ac44c5bf93575328729a26f0491de19e4110b626a78b3ca909a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7da4d39865795ac44c5bf93575328729a26f0491de19e4110b626a78b3ca909a.exe
Resource
win10v2004-20220901-en
General
-
Target
7da4d39865795ac44c5bf93575328729a26f0491de19e4110b626a78b3ca909a
-
Size
234KB
-
MD5
f736d29c631ac9bb9895954e70a75517
-
SHA1
45a911a0fdd33b7c134db31b94eebba17e6983ee
-
SHA256
7da4d39865795ac44c5bf93575328729a26f0491de19e4110b626a78b3ca909a
-
SHA512
5b4456e132476243ec21000c612eede663c698b58395d5edcc76a350c65641921028e4cf87bb16b5b03628e88d6f8ad3c23f28f0d2961e7200911036d5a66eff
-
SSDEEP
6144:LQ4okaHvYdF1QZmpTnTP2jREH5lqXuQ1aJK:ukiYD1cgujR4qfoK
Malware Config
Signatures
Files
-
7da4d39865795ac44c5bf93575328729a26f0491de19e4110b626a78b3ca909a.exe windows x86
f49d1cc9a4742a07d42f4af678d8b145
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memmove
_strnicmp
strncmp
strncpy
_strdup
free
memcpy
strlen
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
TlsAlloc
TlsGetValue
HeapReAlloc
TlsSetValue
WaitForMultipleObjects
EnterCriticalSection
CloseHandle
LeaveCriticalSection
GetCurrentThreadId
InitializeCriticalSection
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
Sections
.code Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tvfsj Size: 208KB - Virtual size: 212KB