Static task
static1
Behavioral task
behavioral1
Sample
502c1bea07a63d3d673525adecfe9aa299cdcc7d1627eaa56293a52f827e614f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
502c1bea07a63d3d673525adecfe9aa299cdcc7d1627eaa56293a52f827e614f.exe
Resource
win10v2004-20220812-en
General
-
Target
502c1bea07a63d3d673525adecfe9aa299cdcc7d1627eaa56293a52f827e614f
-
Size
190KB
-
MD5
060c5ae7057effae67901082fdf81830
-
SHA1
fc2660a860dbd460f174fa98231cfaffdef3e804
-
SHA256
502c1bea07a63d3d673525adecfe9aa299cdcc7d1627eaa56293a52f827e614f
-
SHA512
0b06818593d8d57a64f93d68b36ae0f7bcf4463064fe7ed25dbb04486b9d1ec84ee2c53ee50e215bddee28e9c5b2040be552be965cae38d6f1c82c52899ff1eb
-
SSDEEP
3072:Ym/0/nKGdEj7TZ5Wa/g79alkzf3HfWF0DRP1xNwV2ILLZVTcc/3y+6xNZT6rV24d:FSKGd0Z7K9XT3HfVx+4AVTccyxNUrV
Malware Config
Signatures
Files
-
502c1bea07a63d3d673525adecfe9aa299cdcc7d1627eaa56293a52f827e614f.exe windows x86
4e9742539acaf1775e5f122370f33052
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
CreateEventA
GetACP
ResetEvent
ExitThread
LoadLibraryExA
GlobalFindAtomA
GetProcessHeap
LoadLibraryA
GetModuleFileNameA
VirtualAlloc
GetStringTypeA
GlobalAlloc
LocalAlloc
GetModuleHandleA
GetProcAddress
GetLastError
GetOEMCP
user32
GetCursor
GetFocus
IsWindowEnabled
Sections
CODE Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
._data Size: 1024B - Virtual size: 581B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ