Static task
static1
Behavioral task
behavioral1
Sample
dc1f1c62d3d3dfe0e9e34dcb23ed52f8409b67293dfce0e49314e0c06c7a817b.exe
Resource
win7-20220812-en
General
-
Target
dc1f1c62d3d3dfe0e9e34dcb23ed52f8409b67293dfce0e49314e0c06c7a817b
-
Size
284KB
-
MD5
4025fa7ab606bae292f755fa297f72b8
-
SHA1
cd800e2aefa733eaeaea87ccb53a899969d33ede
-
SHA256
dc1f1c62d3d3dfe0e9e34dcb23ed52f8409b67293dfce0e49314e0c06c7a817b
-
SHA512
55abc83e082f95f2a15b2c8570bf621764f8abb8243fb6ba5b43bf9f736470d59a9b5565735e51a4d6bd14c13fbbf06bb247ecb3cf6fff2fdac2db8d4911ba62
-
SSDEEP
6144:PNgy4vc2Cnq7m4YXWi9w+HljGxJobVOZUm1Mltuum6EApV8vD2npf:KPc2Cnpp9b8xJobcCthm6EA78rO
Malware Config
Signatures
Files
-
dc1f1c62d3d3dfe0e9e34dcb23ed52f8409b67293dfce0e49314e0c06c7a817b.exe windows x86
e304217fc16c011615a0ec22783cbfae
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcatA
InitializeCriticalSection
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
SearchPathA
ResumeThread
WriteProcessMemory
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
RtlUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
user32
DefWindowProcA
AdjustWindowRectEx
Sections
0 Size: 136KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 48KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 8KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE