Static task
static1
Behavioral task
behavioral1
Sample
814bc372e071e3bc828722ca3882a322545f1d8eee6ad67655df31b9b854ee5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
814bc372e071e3bc828722ca3882a322545f1d8eee6ad67655df31b9b854ee5f.exe
Resource
win10v2004-20221111-en
General
-
Target
814bc372e071e3bc828722ca3882a322545f1d8eee6ad67655df31b9b854ee5f
-
Size
16KB
-
MD5
76ff6901c5c0cc46e88864a53900c399
-
SHA1
7ec9b21f3607e6417bd44770310f03cf71376eaa
-
SHA256
814bc372e071e3bc828722ca3882a322545f1d8eee6ad67655df31b9b854ee5f
-
SHA512
a6860e44e7b443dde9ecb3b7ec109ef6bc7fd45979b4a9ef485845375a68512e8626523486a818dbffcb3fbf2c7ca2c2815fc0a14cd852efb221badb4cd0569f
-
SSDEEP
384:qUILsuawi56c8r12I9VIre1mzX7B0k1Wufgpd8Ps48:qJLsuW+8I9VQ7zXykgv8Ps
Malware Config
Signatures
Files
-
814bc372e071e3bc828722ca3882a322545f1d8eee6ad67655df31b9b854ee5f.exe windows x86
36decc04ba70c1c8d72a9c6c6d2dc6c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
ioctlsocket
sendto
accept
GetAddressByNameW
gdi32
CombineRgn
CreateRectRgn
EnumFontFamiliesExW
CreateDIBitmap
EnumMetaFile
GetDeviceGammaRamp
GetKerningPairsW
GetObjectW
GetDCOrgEx
shell32
ShellExecuteExW
DragQueryFileW
FreeIconList
SheSetCurDrive
DuplicateIcon
StrStrA
FindExeDlgProc
Sections
.text Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE