Static task
static1
Behavioral task
behavioral1
Sample
42bd182668a122d82bf0004873f6989edfc1ed8fa445ebd75fd090b28bcc4891.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
42bd182668a122d82bf0004873f6989edfc1ed8fa445ebd75fd090b28bcc4891.exe
Resource
win10v2004-20220812-en
General
-
Target
42bd182668a122d82bf0004873f6989edfc1ed8fa445ebd75fd090b28bcc4891
-
Size
234KB
-
MD5
e9499054742844891abfd1e5c6745f07
-
SHA1
439bca081a95dd683d012ff380abc30582cef5d5
-
SHA256
42bd182668a122d82bf0004873f6989edfc1ed8fa445ebd75fd090b28bcc4891
-
SHA512
f0ba31faad1a38022e530867349a9db72143cbb4adb5255a6234dec1ea0ae6a1e0d4c8f1614130d9c094eee8dd1db398a572822c918b1b9880e95e450c63ab92
-
SSDEEP
3072:7bM6AhAyAnXOEM4Ax5o81YC1UWFNmTg8EcWhAl9Gwa3dqkd3HFjRdItKYg06ydI8:HM6AhAJX+4U5IpWFQTGcWhya3INEYg0d
Malware Config
Signatures
Files
-
42bd182668a122d82bf0004873f6989edfc1ed8fa445ebd75fd090b28bcc4891.exe windows x86
efe28acb2e40bd476a51d45de2173ff1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
strlen
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
GetProcessHeap
HeapAlloc
CloseHandle
InitializeCriticalSection
WriteFile
HeapFree
CreateFileA
GetFileSize
HeapReAlloc
user32
CallWindowProcA
Sections
.code Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ