Static task
static1
Behavioral task
behavioral1
Sample
fax8642174_pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fax8642174_pdf.exe
Resource
win10v2004-20220812-en
General
-
Target
c9c3ebacb624b4be94254fe2eb84adf92edfc13872b118aae2b99eda6c0438d4
-
Size
8KB
-
MD5
bb188ef8590840b72e4fa762e7e99124
-
SHA1
77e4106804b742104300e6b71e5639c8f8653f37
-
SHA256
c9c3ebacb624b4be94254fe2eb84adf92edfc13872b118aae2b99eda6c0438d4
-
SHA512
c7d80d634aa4e56270326b37ecbae392eb887650db0d293f1002105bca6cee833abc07aa2c24b8f817567338f99ee1a4a5bc778a0a872b2dc1d233e8f766ed6b
-
SSDEEP
192:0a8XR0hukY1/oOPH7i2UbrzuThfWdB+9AKnz5J1tmi2VGGoQN:0xouDpo+7fuzuNOah1JTmdsQN
Malware Config
Signatures
Files
-
c9c3ebacb624b4be94254fe2eb84adf92edfc13872b118aae2b99eda6c0438d4.zip
-
fax8642174_pdf.exe.exe windows x86
5e22ef31d0df09f46fa87eafb62c1ffb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
DestroyWindow
SendMessageA
PostQuitMessage
DefWindowProcA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
kernel32
GetStartupInfoA
ExitProcess
GetCommandLineA
HeapCreate
CloseHandle
GetTickCount
GetCurrentProcessId
InterlockedDecrement
InterlockedIncrement
GetFileTime
FindFirstChangeNotificationW
HeapFree
GetCurrentDirectoryA
GetModuleHandleA
HeapAlloc
GetProcessHeap
LoadLibraryW
SetLastError
comctl32
InitCommonControlsEx
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 358B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ