Static task
static1
Behavioral task
behavioral1
Sample
c7f95d8ac3759defc49541af12a306f013791c36975a196581aaee60af8f4b55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7f95d8ac3759defc49541af12a306f013791c36975a196581aaee60af8f4b55.exe
Resource
win10v2004-20220812-en
General
-
Target
c7f95d8ac3759defc49541af12a306f013791c36975a196581aaee60af8f4b55
-
Size
879KB
-
MD5
b0fe8a2ea829639be617dd4d545a1c0e
-
SHA1
321fdced11ea67a40d09c826016c8a404146b0b2
-
SHA256
c7f95d8ac3759defc49541af12a306f013791c36975a196581aaee60af8f4b55
-
SHA512
2a0b23b9220ea26faf0bd4af4693dc0cf180fb2ca3a4537c535b0f443e5124d9c8074c4608000a91dcaa3d5b3506a4fc49fa360646ffded30f2726ecafd543ba
-
SSDEEP
12288:ooSsMqxfiBUQ4K+PaFssO6NhDp+Y739WjSZ4dvnux+7jMMGqe6Ex5JQ3Hq+U89DC:d8CK+PezTpJeSZqjjHrehIa
Malware Config
Signatures
Files
-
c7f95d8ac3759defc49541af12a306f013791c36975a196581aaee60af8f4b55.exe windows x86
11412a2dc8a2d3971151c8a6a278b21f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetFileTime
lstrlenA
GetConsoleTitleA
CloseHandle
CreateFileMappingW
GetStartupInfoA
IsDebuggerPresent
GetModuleFileNameW
LocalFlags
GetCommandLineA
CreateFileW
GlobalSize
GetDriveTypeW
DeleteFileA
FindClose
HeapCreate
GetModuleHandleA
Sleep
DeviceIoControl
user32
LoadImageA
DestroyWindow
IsWindow
DispatchMessageA
CallWindowProcW
IsZoomed
DestroyMenu
GetWindowLongW
DispatchMessageA
BeginPaint
FillRect
PeekMessageA
DrawTextW
dssec
DSEditSecurity
DSEditSecurity
DSEditSecurity
DSEditSecurity
imagehlp
ImageUnload
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 872KB - Virtual size: 872KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ