Static task
static1
Behavioral task
behavioral1
Sample
cd51e07163d5d05756f214c6d1f594aa4cbe41ed6a2599c650aebafad134af0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd51e07163d5d05756f214c6d1f594aa4cbe41ed6a2599c650aebafad134af0b.exe
Resource
win10v2004-20220901-en
General
-
Target
cd51e07163d5d05756f214c6d1f594aa4cbe41ed6a2599c650aebafad134af0b
-
Size
62KB
-
MD5
347a724a80b373a7632fc3cc2a67b3f6
-
SHA1
50317c47b7435f6401bc8c0e05ef9439725987aa
-
SHA256
cd51e07163d5d05756f214c6d1f594aa4cbe41ed6a2599c650aebafad134af0b
-
SHA512
9fdec101f04637ba64a5ddd4e67ca562c4b4f3760374d953e5cb02283d7538d47bb64bb000cab4cd3da8f79112766bb85cff419b8a821e7646b5a467da479de4
-
SSDEEP
768:doKrpPQ3AbuN+XJQ2YEBwKtWch+vkH1JYkyEGMAxVmG17DJ74akR4IMEOO:5NyAbekJQ2dfh+6TE7MWmGxN4jqIMB
Malware Config
Signatures
Files
-
cd51e07163d5d05756f214c6d1f594aa4cbe41ed6a2599c650aebafad134af0b.exe windows x86
6fdcff1eab6845e9015811dbaf916a07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapDestroy
VirtualQuery
GetVolumePathNameA
GetEnvironmentVariableA
FindResourceW
TlsGetValue
Sleep
CloseHandle
GetTimeFormatA
GetModuleHandleA
HeapCreate
lstrlenA
CloseHandle
DeleteFileW
GetStartupInfoA
ResetEvent
CreateEventA
GetCommandLineA
GetCommandLineA
CancelIo
user32
CallWindowProcA
FindWindowA
GetClassInfoA
GetWindowLongA
CreateIcon
IsWindow
GetSysColor
DispatchMessageA
DestroyMenu
IsZoomed
DispatchMessageA
DrawTextW
PeekMessageA
psbase
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
SPDeleteSubtype
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eabcrpx Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE