Static task
static1
Behavioral task
behavioral1
Sample
20d7496e1f03ad648040ca1cb6ec29e8d7ddd0711837815a9e14447cd5015202.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20d7496e1f03ad648040ca1cb6ec29e8d7ddd0711837815a9e14447cd5015202.exe
Resource
win10v2004-20220901-en
General
-
Target
20d7496e1f03ad648040ca1cb6ec29e8d7ddd0711837815a9e14447cd5015202
-
Size
7KB
-
MD5
2d8672106021748a9f37d1a14f57ead2
-
SHA1
7634540b61d7fe94a0b2f84a4b6e95baa4c70eaf
-
SHA256
20d7496e1f03ad648040ca1cb6ec29e8d7ddd0711837815a9e14447cd5015202
-
SHA512
edbf34b2dac8995db60d56d2a185549fb9ce090da6eae9b2f07d65e092040acbbb87c377ef66d3c235bab3cfded7551f6782d17d2190fb44fe7cf8a268d58ea8
-
SSDEEP
48:6sv0AWYtBX+TGSy0PNDP8DyXDBXksYYHglUBMhlvwQH:9pebVX9XGNU2hX
Malware Config
Signatures
Files
-
20d7496e1f03ad648040ca1cb6ec29e8d7ddd0711837815a9e14447cd5015202.exe windows x86
099d3d58319ecaa8bbd7e6ffa127bcea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
GetWindowThreadProcessId
FindWindowA
wsprintfA
kernel32
GetProcAddress
WriteProcessMemory
lstrlenA
lstrcpyA
CloseHandle
CreateFileA
CreateRemoteThread
CreateThread
ExitProcess
GetModuleFileNameA
GetModuleHandleA
WriteFile
GetTempPathA
OpenProcess
VirtualAllocEx
lstrcatA
shell32
ShellExecuteA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE