Static task
static1
Behavioral task
behavioral1
Sample
7f5106999a29d05ad367f7f26ca7ad5066a24543acd0862d4ae5fad961c2d755.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f5106999a29d05ad367f7f26ca7ad5066a24543acd0862d4ae5fad961c2d755.exe
Resource
win10v2004-20221111-en
General
-
Target
7f5106999a29d05ad367f7f26ca7ad5066a24543acd0862d4ae5fad961c2d755
-
Size
192KB
-
MD5
c856d7d6dfa1f641bb06e5251d213fc7
-
SHA1
3e6d470a98cbd435ee4b52d15c068c027bb8d9cc
-
SHA256
7f5106999a29d05ad367f7f26ca7ad5066a24543acd0862d4ae5fad961c2d755
-
SHA512
31a61dddad4aee078f777c8dd9b0d5736477030f70b202d8a8151395b191f35c491834a72f095fa41944612516edc986f994a68fab808367e442dd32116b453e
-
SSDEEP
768:a/dno9CiorI8KhlKWhRHycITlAI1hGqrIfxQHp6++gL4h9AwlvtafEyuwPiQHttq:a+WsKWfy9TlHbjHoBhJttaMypPlq8rT
Malware Config
Signatures
Files
-
7f5106999a29d05ad367f7f26ca7ad5066a24543acd0862d4ae5fad961c2d755.exe windows x86
d6ee4e29275d39bb9613b1bc4add80e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
TlsGetValue
GetFileAttributesA
IsBadCodePtr
HeapCreate
GetStdHandle
HeapDestroy
GetModuleFileNameA
GetCommandLineA
GetStartupInfoA
FindAtomA
CreateFileA
GetModuleHandleA
GetPriorityClass
GetEnvironmentVariableA
DeleteAtom
GetCommandLineA
DeleteFileW
ReadFile
MapViewOfFile
user32
IsZoomed
SetFocus
GetClassInfoA
FindWindowA
DispatchMessageA
DispatchMessageA
GetKeyState
CallWindowProcW
GetWindowLongA
DestroyMenu
DrawTextW
GetWindowInfo
GetSysColor
DestroyMenu
ntlanman
NPGetCaps
NPGetCaps
NPGetCaps
NPGetCaps
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ