Static task
static1
Behavioral task
behavioral1
Sample
f30ff5af1177d7aa34c890f5e740a73ef59314ddbebd48fbf746d6229212d8be.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f30ff5af1177d7aa34c890f5e740a73ef59314ddbebd48fbf746d6229212d8be.exe
Resource
win10v2004-20220901-en
General
-
Target
f30ff5af1177d7aa34c890f5e740a73ef59314ddbebd48fbf746d6229212d8be
-
Size
318KB
-
MD5
1683326c4acb6df3caf1697fad4d9c7e
-
SHA1
b5815e547f1bea8cfe8dcf8f72d965185ca19a89
-
SHA256
f30ff5af1177d7aa34c890f5e740a73ef59314ddbebd48fbf746d6229212d8be
-
SHA512
a50e35ad6b1b3840b6377b786b5984e9b601ddf2b6049eab8ba6fd3d02404e3c56e19d0c6e265085665782214ce67789b6d90f53c2e01d05764cbe24ddb317e7
-
SSDEEP
6144:sPyU7zAT5mc5rYkc1JVJYr/87iq8I0C5rtL1rqIfEgCSoviQMVFn1pvi:Z4s9mc5kzXJS87GtC/UDShTn1E
Malware Config
Signatures
Files
-
f30ff5af1177d7aa34c890f5e740a73ef59314ddbebd48fbf746d6229212d8be.exe windows x86
624192d474d5bd423862f32dc45c38f2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetCommandLineA
GetModuleHandleA
user32
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetMessageA
LoadIconA
RegisterClassExA
TranslateMessage
Sections
.flat Size: 512B - Virtual size: 30B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.viceruv Size: 512B - Virtual size: 50B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 314KB - Virtual size: 314KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 880B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 238B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ