Static task
static1
Behavioral task
behavioral1
Sample
46a09679ac0519a59590402fc5496f5ed5753fa713c1c8ae2f3958bd342542a5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
46a09679ac0519a59590402fc5496f5ed5753fa713c1c8ae2f3958bd342542a5.exe
Resource
win10v2004-20221111-en
General
-
Target
46a09679ac0519a59590402fc5496f5ed5753fa713c1c8ae2f3958bd342542a5
-
Size
23KB
-
MD5
2c8089eb94cf238287087861849c8ed1
-
SHA1
7c314dc43bd21a92983bd579ce3b2f83585e89e6
-
SHA256
46a09679ac0519a59590402fc5496f5ed5753fa713c1c8ae2f3958bd342542a5
-
SHA512
731f740f7a6686c4c30add0bf4a41c8928a229b9424878ef30992554098a35770f2df0786b92d75d4d01d4bdc1e37cf5cc386818b4bd0800edc09a515c80e4d0
-
SSDEEP
384:CPAqfNQk0IsFm//Ek079TgZb9ndHTxd727a0f:Cl+5cgZ0ndHTL72n
Malware Config
Signatures
Files
-
46a09679ac0519a59590402fc5496f5ed5753fa713c1c8ae2f3958bd342542a5.exe windows x86
791391c6ee78faeb23a532329fe4957d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
PostQuitMessage
DefWindowProcA
SendMessageA
DestroyWindow
CreateWindowExA
LoadCursorA
LoadIconA
RegisterClassExA
LoadStringA
GetMessageA
DispatchMessageA
kernel32
ExitProcess
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetProcessHeap
FindFirstChangeNotificationW
lstrcatA
lstrcpyA
GetCommandLineW
CreateFileA
GetLastError
LoadLibraryA
GetCurrentDirectoryA
GetTempFileNameA
CreateThread
GetFileTime
InterlockedIncrement
InterlockedDecrement
GetCurrentProcessId
GetTickCount
CloseHandle
GetModuleHandleA
gdi32
CreateBitmap
comctl32
InitCommonControlsEx
shell32
CommandLineToArgvW
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 334B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ