Static task
static1
Behavioral task
behavioral1
Sample
90a0d165bda623ba02cd8189a36b26b5f54234eb76a6dc871b5c313c4949e686.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90a0d165bda623ba02cd8189a36b26b5f54234eb76a6dc871b5c313c4949e686.exe
Resource
win10v2004-20220812-en
General
-
Target
90a0d165bda623ba02cd8189a36b26b5f54234eb76a6dc871b5c313c4949e686
-
Size
396KB
-
MD5
b4453435ab5887012ec5e3ccfc8a8aad
-
SHA1
c9fda1ef7f76931170531efd078c553ea0869e41
-
SHA256
90a0d165bda623ba02cd8189a36b26b5f54234eb76a6dc871b5c313c4949e686
-
SHA512
611e29f30249994ad3fbc18dcbea15428562f4949855cbd58ae4cbb820c80fac77af69ce27389fb1df8b74c93a9b0c315d54e227ee302d0801164da4d6136c6a
-
SSDEEP
6144:k1tzgwvxHcwvrAyW+z6F+ca+ghfpPO7e34hXpeEI3jv0:k7z79JrvUefICGpefz
Malware Config
Signatures
Files
-
90a0d165bda623ba02cd8189a36b26b5f54234eb76a6dc871b5c313c4949e686.exe windows x86
4db84b9aa60cd3a3fc0fd078fab12557
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetProcAddress
VirtualAlloc
GetModuleHandleA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
HeapReAlloc
GetStringTypeW
user32
SetFocus
EnableWindow
ShowWindow
GetFocus
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 503KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ