Static task
static1
Behavioral task
behavioral1
Sample
bed1491bab31dcf0f730df836d48722704ce4f819d4618ef6ae11ef56a987e13.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bed1491bab31dcf0f730df836d48722704ce4f819d4618ef6ae11ef56a987e13.exe
Resource
win10v2004-20220812-en
General
-
Target
bed1491bab31dcf0f730df836d48722704ce4f819d4618ef6ae11ef56a987e13
-
Size
97KB
-
MD5
5010ddf1580c16b57a75104f88731b3d
-
SHA1
208346b4cca6c5704fa618eafce5f70936dc3809
-
SHA256
bed1491bab31dcf0f730df836d48722704ce4f819d4618ef6ae11ef56a987e13
-
SHA512
1da3440834d91343a1780d19de7f2b45ad2a9e9e63383cfe7252490b377f7b03e74bf31abf643609153c617cd85b942b783c867f057caf117c628564fcebb753
-
SSDEEP
3072:EDCCNtkPU4jDyd67V97Fs74sjEgVHpv4+KSB04tYlr:5CN+PZjDdR9hs7E8HZ4+KSB04
Malware Config
Signatures
Files
-
bed1491bab31dcf0f730df836d48722704ce4f819d4618ef6ae11ef56a987e13.exe windows x86
a4b0feb8e9a11488383329ca8478297d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetDesktopWindow
kernel32
Sleep
VirtualAlloc
GetCurrentProcessId
lstrlenW
VirtualFree
ExitProcess
Sections
.text Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 263B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dsfwer Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pulkxkh Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE