Static task
static1
Behavioral task
behavioral1
Sample
858133d4be729c64d010b23a02a8eaef57bfce6ad459d1e3ffc70e1a1f25bc8d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
858133d4be729c64d010b23a02a8eaef57bfce6ad459d1e3ffc70e1a1f25bc8d.exe
Resource
win10v2004-20220812-en
General
-
Target
858133d4be729c64d010b23a02a8eaef57bfce6ad459d1e3ffc70e1a1f25bc8d
-
Size
4KB
-
MD5
c92ea84d7a56e1655f1be43d4bc34adf
-
SHA1
1275eabf90c2f82b8b32c8cada65ec71294ae6b8
-
SHA256
858133d4be729c64d010b23a02a8eaef57bfce6ad459d1e3ffc70e1a1f25bc8d
-
SHA512
32326708bb9f23ff494b4ff81a9c1709dc33d7c8b9b8720f110047e6794e54a26824a35682aa8a87d1b15bad1b3bc9dec4bd5bc5d9f968f70ecc69a20c908a9a
Malware Config
Signatures
Files
-
858133d4be729c64d010b23a02a8eaef57bfce6ad459d1e3ffc70e1a1f25bc8d.exe windows x86
1c797ca7322b39ebd3ad70e9e3149863
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenW
OpenProcess
lstrlenA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
HeapAlloc
GetCommandLineA
GetStartupInfoA
ExitProcess
GetProcessHeap
user32
wsprintfW
msvcrt
_except_handler3
_strlwr
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 734B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE