Static task
static1
Behavioral task
behavioral1
Sample
44891cd648470d60634f1a8510b49b83a792d69ae8866d72f61b911f89671ffc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
44891cd648470d60634f1a8510b49b83a792d69ae8866d72f61b911f89671ffc.exe
Resource
win10v2004-20220812-en
General
-
Target
44891cd648470d60634f1a8510b49b83a792d69ae8866d72f61b911f89671ffc
-
Size
115KB
-
MD5
4803d392a849cdf1fb58200d6bf9c779
-
SHA1
b5f5e63d5da055ab9e35dfa5c36be1c2b871e8ea
-
SHA256
44891cd648470d60634f1a8510b49b83a792d69ae8866d72f61b911f89671ffc
-
SHA512
1984d4b5f44ea3d3dffa0ebbae8d3e34790109f56407c94fe55fac5a5a43ad848eda2d91621368ef895b85b85d1f4639b194b5bef26d93ea07250bcb52bd7f4e
-
SSDEEP
3072:Eyrom4kg2FkwgpnUmtDq9XRVqJQx4Mm4ELK:EwTFZg9UmtO9sZ
Malware Config
Signatures
Files
-
44891cd648470d60634f1a8510b49b83a792d69ae8866d72f61b911f89671ffc.exe windows x86
555bed05c836004d6c737276ac40c676
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetProcAddress
CompareStringA
GetProcessHeap
IsDebuggerPresent
GetModuleHandleW
GetSystemInfo
GlobalLock
VirtualProtectEx
lstrcpynA
MulDiv
CreateProcessW
CreateFileMappingA
GetStdHandle
GetTempPathW
CompareStringW
FileTimeToLocalFileTime
GetCommandLineW
VirtualQuery
GetLocaleInfoA
DeviceIoControl
GetTempPathA
msvcrt
_initterm
__getmainargs
__p__fmode
__set_app_type
_exit
_except_handler3
__p___initenv
_controlfp
_adjust_fdiv
__p__commode
free
_XcptFilter
__setusermatherr
calloc
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ