Static task
static1
Behavioral task
behavioral1
Sample
7a652f96d253a60e348f853cb84d196928fe0d92265a5873d937e0c593c6aca9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a652f96d253a60e348f853cb84d196928fe0d92265a5873d937e0c593c6aca9.exe
Resource
win10v2004-20221111-en
General
-
Target
7a652f96d253a60e348f853cb84d196928fe0d92265a5873d937e0c593c6aca9
-
Size
83KB
-
MD5
8cae02bdaee73a991d83744efcc31e8e
-
SHA1
7d10d35d6d6a5b36c647efcc19058936c3325b6c
-
SHA256
7a652f96d253a60e348f853cb84d196928fe0d92265a5873d937e0c593c6aca9
-
SHA512
54ed8fcd82932faebf8ca50efab9d592f77aa6063465fefa186c4f1950b9bf096dfe742ee614b5436c3ca82541dff670fec4122d0f76603c2624302c61540c1b
-
SSDEEP
1536:rJd8AKFzqULshi5qJubQbWjjZdyfqaXLZW/R:D859qk5qJubEi9d+XLqR
Malware Config
Signatures
Files
-
7a652f96d253a60e348f853cb84d196928fe0d92265a5873d937e0c593c6aca9.exe windows x86
ce68ac8dfc2eff27d1426a0f4f2733b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
GetStartupInfoA
ReleaseMutex
HeapCreate
GetStdHandle
CreateFileMappingA
IsBadCodePtr
TlsAlloc
CreateFileA
GetFileAttributesW
GetEnvironmentVariableA
GetCommandLineW
SetEvent
GetModuleHandleA
TlsGetValue
GetACP
GetModuleFileNameA
ResetEvent
SetLastError
lstrlenA
user32
IsWindow
PeekMessageA
IsZoomed
GetWindowLongA
DispatchMessageA
DrawTextW
GetSysColor
GetClassInfoA
DispatchMessageA
DestroyMenu
FindWindowA
CallWindowProcW
CreateIcon
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
timedate.cpl
CPlApplet
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE