Static task
static1
Behavioral task
behavioral1
Sample
865b680420b423438c7973f0646bbd54b2d0c93def11efc00fbcd016ae1f2b5d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
865b680420b423438c7973f0646bbd54b2d0c93def11efc00fbcd016ae1f2b5d.exe
Resource
win10v2004-20220812-en
General
-
Target
865b680420b423438c7973f0646bbd54b2d0c93def11efc00fbcd016ae1f2b5d
-
Size
307KB
-
MD5
835bccba9e5509231663d1e4e8828353
-
SHA1
6c9f5f378535b81492fd2d99098706b48a4b770f
-
SHA256
865b680420b423438c7973f0646bbd54b2d0c93def11efc00fbcd016ae1f2b5d
-
SHA512
6d7c6ce1d7471817b8457c08c6ac1c9cf1d667ed8c77fb70bd738fa8175846c1754095dd5864fb13f9d18f9ea8cd4cd0724901a309c80f1af8036040bf61eec0
-
SSDEEP
6144:Ft1GOdZJsd31/Htx7/oFmpXSKH3W0u9a10K9264soD9iZfq969EFqp:F/jOd3l3oFaHm0wu0a1cenm
Malware Config
Signatures
Files
-
865b680420b423438c7973f0646bbd54b2d0c93def11efc00fbcd016ae1f2b5d.exe windows x86
d24e3c7067399cdf752ce36a57da92f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
TerminateThread
HeapDestroy
GetFileType
OpenSemaphoreA
GetProcAddress
GetModuleHandleA
VirtualAlloc
GetProcessHeap
user32
GetParent
GetTopWindow
LoadCursorA
gdi32
CreatePatternBrush
ole32
CoInitialize
netapi32
NetDfsAddFtRoot
psapi
GetModuleBaseNameA
avifil32
AVIPutFileOnClipboard
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 512B - Virtual size: 78B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vdata Size: 512B - Virtual size: 30B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 225KB - Virtual size: 648KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.svata Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE