Static task
static1
Behavioral task
behavioral1
Sample
857ae1b7a608e5c9c5ad11f8e26d506bf39edc2879c1221c7d421549a05420b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
857ae1b7a608e5c9c5ad11f8e26d506bf39edc2879c1221c7d421549a05420b6.exe
Resource
win10v2004-20220812-en
General
-
Target
857ae1b7a608e5c9c5ad11f8e26d506bf39edc2879c1221c7d421549a05420b6
-
Size
753KB
-
MD5
48323110003734ca0e4805d2f3246e40
-
SHA1
8a7dd563d6788946cc73ca6b7c1c84630ad15a60
-
SHA256
857ae1b7a608e5c9c5ad11f8e26d506bf39edc2879c1221c7d421549a05420b6
-
SHA512
75ae75444f1d35a92e4d0f8a994a00a67a106fd9ca034238b1373b9e5c1ff2afe7317f0bc019130c4b57dc150eaf509aff813fea67f3a184780585d6a65d3f39
-
SSDEEP
12288:f79eHCsYGmAMMpwD/qEez4TukFO4X3j0tdUEgmJG54r0CNQ3xe63G/A/ajEsB2/8:f79eHCP/AwzU+OZg54bNQhe63Gb92tSl
Malware Config
Signatures
Files
-
857ae1b7a608e5c9c5ad11f8e26d506bf39edc2879c1221c7d421549a05420b6.exe windows x86
ca5c54efda87b8f3bfccdb50dded4f06
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
ExitProcess
FindClose
HeapDestroy
ReleaseMutex
WriteConsoleA
lstrlenW
GetModuleHandleA
SuspendThread
CloseHandle
GetStartupInfoA
HeapCreate
GetTickCount
GetEnvironmentVariableW
GetCommandLineW
OpenEventW
SetEvent
CreateSemaphoreW
CloseHandle
FindResourceExA
user32
GetClassInfoA
IsZoomed
FindWindowA
CreateIcon
CallWindowProcW
DispatchMessageA
GetSysColor
PeekMessageA
GetKeyState
DrawTextW
GetWindowLongA
SetFocus
DispatchMessageA
docprop
DllGetClassObject
DllGetClassObject
DllGetClassObject
DllGetClassObject
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ