Static task
static1
Behavioral task
behavioral1
Sample
82d8e65a75e3d955d2fd850f4a7a17b31a4dc74660f664d15f1af42e7b3c2a3a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
82d8e65a75e3d955d2fd850f4a7a17b31a4dc74660f664d15f1af42e7b3c2a3a.exe
Resource
win10v2004-20220812-en
General
-
Target
82d8e65a75e3d955d2fd850f4a7a17b31a4dc74660f664d15f1af42e7b3c2a3a
-
Size
33KB
-
MD5
0274ed1038224cbbb303bc5e2a24ef43
-
SHA1
870103897a8c82231cb1bde6251b42dc803b3510
-
SHA256
82d8e65a75e3d955d2fd850f4a7a17b31a4dc74660f664d15f1af42e7b3c2a3a
-
SHA512
afdf6a98bc6bafdf421cb054d0ff85aff52b38709a52e84bc17e5583513a8977ecda359d8b2343170ffa26d5db05f1ba042856f34f5108492cd7bcbcf8c50e25
-
SSDEEP
768:Lk8l3iEdkO6NNUrArwZTgsDZJaOvgymhP1SHAXWWSMswmNyQ:LkU3ihNg0LsDnaunmhP1SgXWWSMCA
Malware Config
Signatures
Files
-
82d8e65a75e3d955d2fd850f4a7a17b31a4dc74660f664d15f1af42e7b3c2a3a.exe windows x86
fcb816e61b165425738cfdc54b4b53d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMessageW
LoadAcceleratorsW
LoadStringW
RegisterClassExW
LoadCursorW
LoadIconW
UpdateWindow
ShowWindow
CreateWindowExW
GetClientRect
PostQuitMessage
SendMessageW
DestroyWindow
DefWindowProcW
SetWindowTextW
TranslateMessage
DispatchMessageW
kernel32
SetCurrentDirectoryW
GetModuleHandleA
GetStartupInfoA
CreateFileW
CloseHandle
Sleep
GetCommandLineW
LoadLibraryW
GetLastError
CopyFileA
SetFileAttributesA
shlwapi
PathMatchSpecW
PathIsDirectoryW
PathCompactPathExW
PathFindFileNameW
PathFileExistsW
PathFindExtensionW
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__acmdln
exit
_XcptFilter
_exit
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ