Static task
static1
Behavioral task
behavioral1
Sample
fd37478e00a3dac7ba660fe597ca85a2488b0d9349cb29421652cbcc3953af94.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fd37478e00a3dac7ba660fe597ca85a2488b0d9349cb29421652cbcc3953af94.exe
Resource
win10v2004-20221111-en
General
-
Target
fd37478e00a3dac7ba660fe597ca85a2488b0d9349cb29421652cbcc3953af94
-
Size
236KB
-
MD5
05c51ab79fe42a7e22dd53f926bda3be
-
SHA1
d6162bf758c55ac5911f577e05d567a81e31dc3e
-
SHA256
fd37478e00a3dac7ba660fe597ca85a2488b0d9349cb29421652cbcc3953af94
-
SHA512
0f17fd278449efc9a5978892b6caa632a9cbc7480288cc06244411eaa7e0e1f7a36deb7a14e598789afb0b5079a5bc3609ed11cf4225b749bf8d350aa4cbae82
-
SSDEEP
6144:p4H0JcMqF1QTOOcciJyV93BA3qMgNChGMamD1:OH0uMqcyOjsYVBAhgN/ID
Malware Config
Signatures
Files
-
fd37478e00a3dac7ba660fe597ca85a2488b0d9349cb29421652cbcc3953af94.exe windows x86
e85cfd58a9d911e7055cea8b68ed0244
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetProcAddress
RtlZeroMemory
CreateThread
lstrcpyA
WaitForSingleObject
HeapAlloc
LoadLibraryA
ExitProcess
ntdll
_wcsnicmp
user32
OpenClipboard
TranslateMessage
GetMessageA
DispatchMessageW
ole32
CoInitialize
comctl32
ord17
powrprof
GetActivePwrScheme
GetPwrCapabilities
clusapi
ClusterEnum
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE