Static task
static1
Behavioral task
behavioral1
Sample
5774cf8dbe4f4015c8a4f1cd54c44791d3f4fa4dd2033fddb046f4223a07961e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5774cf8dbe4f4015c8a4f1cd54c44791d3f4fa4dd2033fddb046f4223a07961e.exe
Resource
win10v2004-20221111-en
General
-
Target
5774cf8dbe4f4015c8a4f1cd54c44791d3f4fa4dd2033fddb046f4223a07961e
-
Size
12KB
-
MD5
df14bbad6ef01b088b2e69aa44e18cbd
-
SHA1
988907d658e03f175483c86e9d6e3cf96063c48a
-
SHA256
5774cf8dbe4f4015c8a4f1cd54c44791d3f4fa4dd2033fddb046f4223a07961e
-
SHA512
57440bfe28d5550ccb92781974bf040d884cf66dd574f51a1e98f3324c643d6780221643b7f4c39564e530523b21d30ab9abafb68231a8b95c2789f1fc0c8a2c
-
SSDEEP
192:4UTdE5iWRKJNgG7o4HoYpKYGRmWfWZAz6D6lW/ONdPJp05dCqyxRai3/W:4kd57jpPGR+Az6Dv/ONNJ4dCqyx4i3/
Malware Config
Signatures
Files
-
5774cf8dbe4f4015c8a4f1cd54c44791d3f4fa4dd2033fddb046f4223a07961e.exe windows x86
e62d855e34dbe8acd94d98be429863c7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_ftol
modf
strchr
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
kernel32
CloseHandle
GetUserDefaultLCID
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapFree
IsBadReadPtr
WriteFile
CreateFileA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
MultiByteToWideChar
WideCharToMultiByte
user32
MessageBoxA
wsprintfA
ole32
CLSIDFromProgID
OleRun
CoInitialize
CoCreateInstance
CLSIDFromString
CoUninitialize
oleaut32
VariantChangeType
VariantInit
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayDestroy
VariantClear
SysAllocString
SafeArrayCreate
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
SafeArrayGetElemsize
SafeArrayUnaccessData
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE