Static task
static1
Behavioral task
behavioral1
Sample
4e5d9ec5b376fbeba2cf794bbae2e7ca02c7b29b76bfee14b562a9398c1a4245.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4e5d9ec5b376fbeba2cf794bbae2e7ca02c7b29b76bfee14b562a9398c1a4245.exe
Resource
win10v2004-20220901-en
General
-
Target
4e5d9ec5b376fbeba2cf794bbae2e7ca02c7b29b76bfee14b562a9398c1a4245
-
Size
4.0MB
-
MD5
be405bba929b93c69d8509062ab650bd
-
SHA1
7900a4fcb71c9ce35d2ba5277f0d04a659307350
-
SHA256
4e5d9ec5b376fbeba2cf794bbae2e7ca02c7b29b76bfee14b562a9398c1a4245
-
SHA512
fa1ed8932bf2746b678c171812fbf476910bca88008a924cd909c7a4dc064040666fd300c6c18463fa740b86830e5594de78f5bfff4dea58ba96e32dc1e5dc1e
-
SSDEEP
49152:TPvxPREo26N54P4qTp7MxQFoa5+zEkIdIJSOsIC0LQreP4ti63400pT:TXTfxf++y+dYF0UrHBb01
Malware Config
Signatures
Files
-
4e5d9ec5b376fbeba2cf794bbae2e7ca02c7b29b76bfee14b562a9398c1a4245.exe windows x86
3f7a571f6b4db2fcaebe1492041f9212
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
user32
GetCapture
gdi32
DeleteObject
comdlg32
GetOpenFileNameA
winspool.drv
DocumentPropertiesA
advapi32
RegCloseKey
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
oledlg
OleUIEditLinksA
ole32
StgOpenStorageOnILockBytes
oleaut32
OleCreateFontIndirect
ws2_32
WSARecvFrom
wsock32
accept
secur32
LsaGetLogonSessionData
dbghelp
MiniDumpWriteDump
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 903KB - Virtual size: 904KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ