Static task
static1
Behavioral task
behavioral1
Sample
d1445195392dbcf7264964e05180143edef4265e30ed5afb22ec580f0700f5f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d1445195392dbcf7264964e05180143edef4265e30ed5afb22ec580f0700f5f7.exe
Resource
win10v2004-20220812-en
General
-
Target
d1445195392dbcf7264964e05180143edef4265e30ed5afb22ec580f0700f5f7
-
Size
236KB
-
MD5
bcabe153924af3827252d817ff869396
-
SHA1
07275cb844bed3a439c008b618978211b82666c8
-
SHA256
d1445195392dbcf7264964e05180143edef4265e30ed5afb22ec580f0700f5f7
-
SHA512
30a9d2c467897d9380be4b2806bdfece944a601cced912f138ae4a6a4ee93ce700ee6960dc42b529b3a75fac3c5ca18a4870199c58f1783d27fb76f9bb48d286
-
SSDEEP
6144:p4H0JcMqF1QTOOcciJyV93BA3qMgNChGMamD0j:OH0uMqcyOjsYVBAhgN/ID
Malware Config
Signatures
Files
-
d1445195392dbcf7264964e05180143edef4265e30ed5afb22ec580f0700f5f7.exe windows x86
e85cfd58a9d911e7055cea8b68ed0244
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetProcAddress
RtlZeroMemory
CreateThread
lstrcpyA
WaitForSingleObject
HeapAlloc
LoadLibraryA
ExitProcess
ntdll
_wcsnicmp
user32
OpenClipboard
TranslateMessage
GetMessageA
DispatchMessageW
ole32
CoInitialize
comctl32
ord17
powrprof
GetActivePwrScheme
GetPwrCapabilities
clusapi
ClusterEnum
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE