Static task
static1
Behavioral task
behavioral1
Sample
d100b683880d18256717e5157faf9e948e649636b8409c9f709dabf4a60652e7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d100b683880d18256717e5157faf9e948e649636b8409c9f709dabf4a60652e7.exe
Resource
win10v2004-20220812-en
General
-
Target
d100b683880d18256717e5157faf9e948e649636b8409c9f709dabf4a60652e7
-
Size
392KB
-
MD5
f6314f27070682d2642765f0f4255f51
-
SHA1
371e604dfe336eabb8bbc98c550c00e20f519408
-
SHA256
d100b683880d18256717e5157faf9e948e649636b8409c9f709dabf4a60652e7
-
SHA512
28c61feacac0fd950bfde96ce0d9df9a048fae96739b5e0e7acfd89cdd3468edd7b23f4de11a203c527c6312d1c4035c596b12b5521e022ab6923936f2931867
-
SSDEEP
6144:uM6RGiUK7ifuiUHq7bAIPjlTn9Zn0c6ZpGv7JQ+Zx5jeNTlEk4jjNdaqTe:uM63pLObjhn9lbeGvqXTlEk4Lo
Malware Config
Signatures
Files
-
d100b683880d18256717e5157faf9e948e649636b8409c9f709dabf4a60652e7.exe windows x86
c94ae19e74841e90b92ddb7fa40c7fc3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
strcmp
memmove
memcpy
_CIcosh
strlen
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
CloseHandle
InitializeCriticalSection
GetModuleFileNameA
WaitForSingleObject
PeekNamedPipe
HeapReAlloc
HeapAlloc
HeapFree
user32
CallWindowProcA
Sections
.code Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ