Static task
static1
Behavioral task
behavioral1
Sample
874ba0c83ea884e2f41d69412d260ecb8b2df606136b49b66e1831483e327338.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
874ba0c83ea884e2f41d69412d260ecb8b2df606136b49b66e1831483e327338.exe
Resource
win10v2004-20221111-en
General
-
Target
874ba0c83ea884e2f41d69412d260ecb8b2df606136b49b66e1831483e327338
-
Size
36KB
-
MD5
c369a9b60f423b1ef1a16d75dead7770
-
SHA1
26e3780bae6b772a250ec1eed529f76c347447f6
-
SHA256
874ba0c83ea884e2f41d69412d260ecb8b2df606136b49b66e1831483e327338
-
SHA512
06d243de034ca028d904de4716f240f098bba518c77e859db4ecfecabdfd3f00f62f1691785499cd25419eea0646f2003fedb74acd3ce22c983285c122d97189
-
SSDEEP
768:dMeq6jtx925uCh0nZtzYWeGB27f7POF1xqFgHxcsNnvV:Ci2qnzYeB4DgbqFgRHvV
Malware Config
Signatures
Files
-
874ba0c83ea884e2f41d69412d260ecb8b2df606136b49b66e1831483e327338.exe windows x86
d47fcbf0a81d630b936ede29f913e362
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
ExitProcess
CloseHandle
ReadFile
SetFilePointer
GetFileSize
GetModuleFileNameA
GetModuleHandleA
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualFree
UnmapViewOfFile
MapViewOfFileEx
CreateFileMappingA
GetProcAddress
LoadLibraryA
user32
PostQuitMessage
GetKeyNameTextA
LoadCursorA
DefWindowProcA
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ