Static task
static1
Behavioral task
behavioral1
Sample
8a64e2ea51d9482751be5f31885cea8ee37ee2d86e1ecf14efa69a78ccae7073.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8a64e2ea51d9482751be5f31885cea8ee37ee2d86e1ecf14efa69a78ccae7073.exe
Resource
win10v2004-20220901-en
General
-
Target
8a64e2ea51d9482751be5f31885cea8ee37ee2d86e1ecf14efa69a78ccae7073
-
Size
20KB
-
MD5
cf545d394a5fb6d3cd6d37104225f12d
-
SHA1
9662c71592bb0d378344a9c5f00f3bfd7f1800d6
-
SHA256
8a64e2ea51d9482751be5f31885cea8ee37ee2d86e1ecf14efa69a78ccae7073
-
SHA512
6bf738cebe2ebf88e6c303e1334774c7e96d24936a93ea79bf2acb03e9d1d7157c3c2e4e840e4a7365ca740dc8477a46e83cbac4c45c7f487088249696ec7233
-
SSDEEP
384:YzOn8vmxN9LXvBPR8VBDBDVD0poOXnOWC6p5JW:YI8v2lJ6BDBDVopvXnBp5JW
Malware Config
Signatures
Files
-
8a64e2ea51d9482751be5f31885cea8ee37ee2d86e1ecf14efa69a78ccae7073.exe windows x86
51f5ef9198bb0719b202456137e523e5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc40
ord2843
ord5360
ord3578
ord1539
ord3890
ord4657
ord2086
ord4608
ord5647
ord3837
ord4694
ord3314
ord4296
ord3922
ord2323
ord1785
ord5649
ord3268
ord4510
ord1494
ord4677
ord2140
ord1850
ord4691
ord2617
ord4173
ord2199
ord3945
ord2744
ord2845
ord2620
ord2696
ord3345
ord3346
ord3340
ord2694
ord3580
ord4101
ord3907
ord3134
ord570
ord315
ord731
ord3724
ord1014
ord1035
ord706
ord5139
ord3656
ord486
ord2514
ord2081
ord2754
ord3859
ord5145
ord4853
ord1759
ord3894
ord3928
ord4321
ord4428
ord4374
ord5132
ord4850
ord1718
ord856
ord3109
ord1805
ord2707
ord538
ord274
ord729
ord4142
ord4681
ord5648
ord3963
ord2234
ord2197
ord5070
ord3431
ord965
ord4627
ord2097
ord2909
ord4713
ord4715
ord2390
ord3579
ord4165
ord4719
ord4703
ord5053
ord4096
ord3906
ord3259
ord721
ord504
ord2299
ord1060
ord1100
ord3820
ord2557
ord3298
ord3047
ord1423
ord1758
ord4450
ord4312
ord662
ord421
ord3761
ord1368
msvcrt40
_exit
_XcptFilter
exit
_onexit
__p__acmdln
_initterm
__getmainargs
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
time
free
atoi
malloc
__dllonexit
__CxxFrameHandler
_itoa
_setmbcp
kernel32
GetVersion
GetModuleHandleA
Sleep
GetStartupInfoA
user32
DrawIcon
GetClientRect
AppendMenuA
IsIconic
EnableWindow
SendDlgItemMessageA
SendMessageA
GetSystemMenu
GetSystemMetrics
LoadIconA
wsock32
gethostbyaddr
listen
setsockopt
ioctlsocket
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ