Static task
static1
Behavioral task
behavioral1
Sample
677cba427aaff147e57bcf8ba7ff24da62126e9725cb610d90a435b35d9c7754.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
677cba427aaff147e57bcf8ba7ff24da62126e9725cb610d90a435b35d9c7754.exe
Resource
win10v2004-20220812-en
General
-
Target
677cba427aaff147e57bcf8ba7ff24da62126e9725cb610d90a435b35d9c7754
-
Size
236KB
-
MD5
82d2a80251559cbac57c1f1555180ad5
-
SHA1
d376e5271a40f42957420f55275e5541181db843
-
SHA256
677cba427aaff147e57bcf8ba7ff24da62126e9725cb610d90a435b35d9c7754
-
SHA512
90a664be246c27f61f6e9b65644a9f56d2c6c96e113be99a72d036cbe38ce7c795d7055b7750ea8167a4c0652058de40e0ae88254c92548d91f12182ab0a2a03
-
SSDEEP
6144:p4H0JcMqF1QTOOcciJyV93BA3qMgNChGMamDY:OH0uMqcyOjsYVBAhgN/ID
Malware Config
Signatures
Files
-
677cba427aaff147e57bcf8ba7ff24da62126e9725cb610d90a435b35d9c7754.exe windows x86
e85cfd58a9d911e7055cea8b68ed0244
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetProcAddress
RtlZeroMemory
CreateThread
lstrcpyA
WaitForSingleObject
HeapAlloc
LoadLibraryA
ExitProcess
ntdll
_wcsnicmp
user32
OpenClipboard
TranslateMessage
GetMessageA
DispatchMessageW
ole32
CoInitialize
comctl32
ord17
powrprof
GetActivePwrScheme
GetPwrCapabilities
clusapi
ClusterEnum
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE