?SecondTimer@@YG_KPAUHBITMAP__@@PAU_PSP@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
412b81ae314ed3a013046705958758e7964e77d66152f2f03df6ed24a1bbb43c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
412b81ae314ed3a013046705958758e7964e77d66152f2f03df6ed24a1bbb43c.exe
Resource
win10v2004-20220901-en
General
-
Target
412b81ae314ed3a013046705958758e7964e77d66152f2f03df6ed24a1bbb43c
-
Size
171KB
-
MD5
43ddfcb2bf4ad1b071e483043f3e1d63
-
SHA1
41cf3ebc3f9f737a2836eb8c5a6d48831ad3da8a
-
SHA256
412b81ae314ed3a013046705958758e7964e77d66152f2f03df6ed24a1bbb43c
-
SHA512
81ed5e8a6a6f6c9f0c67d55a9df340913ec1c06b55ed09998818b96d56d1784a5b8d5e4318be43277778eb83e3b64b04512f4020a1ec9d5cd61427bfaef3917f
-
SSDEEP
3072:7LzVX79Od8Enjyl7V7Go8GOOXDU2qD/g66KBDZ1I6Lha24kJCRfzyjHXP/i82fro:7nhq7jyP7tfqDXZ1IazkZ6Xn2f6iQ9
Malware Config
Signatures
Files
-
412b81ae314ed3a013046705958758e7964e77d66152f2f03df6ed24a1bbb43c.exe windows x86
038a5370db447dfc63c5b492bc92207a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
VkKeyScanA
kernel32
GetProcessHeap
Exports
Exports
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dec1z Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dec2z Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ued Size: 512B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dec2p Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dec3s Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ