Static task
static1
Behavioral task
behavioral1
Sample
ed363d5a825a6bbe9e483495b040a16de2a18b888e8cd3e162446d20cf7febac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed363d5a825a6bbe9e483495b040a16de2a18b888e8cd3e162446d20cf7febac.exe
Resource
win10v2004-20221111-en
General
-
Target
ed363d5a825a6bbe9e483495b040a16de2a18b888e8cd3e162446d20cf7febac
-
Size
20.0MB
-
MD5
877918603368e40e0f39fe2a29c5a514
-
SHA1
4dab1e21bf9af0dafecf79909865cf0ccc110152
-
SHA256
ed363d5a825a6bbe9e483495b040a16de2a18b888e8cd3e162446d20cf7febac
-
SHA512
7a336d6faafec7b65c6452f9284b4c51c8ef8437ef4a9c59bd235e516964f1531f463c8746d5dd314c3b2beadb52cc916df2934d138b973020010210e8c16123
-
SSDEEP
393216:HvDaQb/JGPNCEN5wkB+2a3r8mcYOn0nIoi2Sglsg0:2OxGVC65FB1aAmUahiB/
Malware Config
Signatures
Files
-
ed363d5a825a6bbe9e483495b040a16de2a18b888e8cd3e162446d20cf7febac.exe windows x86
6360b5afef3022f7dbcabd9b95ff6056
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
WaitForSingleObject
FindResourceA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
GetStringTypeW
user32
GetDesktopWindow
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 348KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ