Static task
static1
Behavioral task
behavioral1
Sample
c44d847455446c8cf3209b9b83c3c5b1b51b218520d602ba482874dd855d63a5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c44d847455446c8cf3209b9b83c3c5b1b51b218520d602ba482874dd855d63a5.exe
Resource
win10v2004-20221111-en
General
-
Target
c44d847455446c8cf3209b9b83c3c5b1b51b218520d602ba482874dd855d63a5
-
Size
18KB
-
MD5
935db0cf1a580c7b7e28aa12c2ded8d0
-
SHA1
50098a554321695cd06f18e65c810777e7eeb8c5
-
SHA256
c44d847455446c8cf3209b9b83c3c5b1b51b218520d602ba482874dd855d63a5
-
SHA512
c8ef29cc07531afe7e4cc58266889fb4f8eb4040f8da9910989534761599fa91623e66991043bcd59d27ed878c867ad0f414ed67dd8de2b5e0c1bd9f7e5867af
-
SSDEEP
384:LFXTqKaVj/6y0wY9KWtDKiihh5Z1gHadJJ4W2yq81LSpm:LtqKkjWrwUKiihh5Z1GuJqm1LSpm
Malware Config
Signatures
Files
-
c44d847455446c8cf3209b9b83c3c5b1b51b218520d602ba482874dd855d63a5.exe windows x86
198d9a58ecb1c5e42b1df6a22e12c026
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
ExitProcess
LocalFree
FormatMessageA
ReadFile
FileTimeToSystemTime
VirtualAlloc
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
GetSystemTimeAsFileTime
GlobalUnlock
GetLastError
RaiseException
SystemTimeToFileTime
FileTimeToLocalFileTime
GlobalLock
GlobalFree
CreateFileA
RtlUnwind
TerminateProcess
IsDebuggerPresent
user32
MessageBoxA
wsprintfA
advapi32
RegDeleteValueA
RegQueryInfoKeyA
RegSetValueExA
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ