Static task
static1
Behavioral task
behavioral1
Sample
de2157c6774173f18db576e7c454bf3a50ef87d3dfdd65bafe26b105a1b54e26.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de2157c6774173f18db576e7c454bf3a50ef87d3dfdd65bafe26b105a1b54e26.exe
Resource
win10v2004-20221111-en
General
-
Target
de2157c6774173f18db576e7c454bf3a50ef87d3dfdd65bafe26b105a1b54e26
-
Size
5KB
-
MD5
5b79e962b9ddf980bb9f23b14eff8d5e
-
SHA1
949f42925273d5f89874ba4242049f03667dffcc
-
SHA256
de2157c6774173f18db576e7c454bf3a50ef87d3dfdd65bafe26b105a1b54e26
-
SHA512
8e0db1d2872e5e639fd48ced606ef34c4809fb8d8ad39d4ba37a3a5adf6ec85261f9b612bf0d194d1dcac6174f4387ce9b3dafc60f03ffa6b3ea06d84e19fab8
-
SSDEEP
96:WlT05wTetJB0icUox+DsL29FOC55DyULhGC3QagoqX:WhWwTe0icUogDaULoC3aZ
Malware Config
Signatures
Files
-
de2157c6774173f18db576e7c454bf3a50ef87d3dfdd65bafe26b105a1b54e26.exe windows x86
bf3faad560b4c2ffa9363f51fd9791b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowA
GetWindowThreadProcessId
wsprintfA
MessageBoxA
kernel32
HeapAlloc
CreateProcessA
WaitForSingleObject
CloseHandle
OpenProcess
GetModuleHandleA
VirtualFreeEx
RtlMoveMemory
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetProcessHeap
ExitProcess
GetModuleFileNameA
HeapFree
GetStartupInfoA
urlmon
URLDownloadToFileA
msvcrt
modf
_ftol
sprintf
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE