Static task
static1
Behavioral task
behavioral1
Sample
ee44620a6b5a3baaffe2ed7b75645a022b7b88b051edc44aa80218d37f984ba0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ee44620a6b5a3baaffe2ed7b75645a022b7b88b051edc44aa80218d37f984ba0.exe
Resource
win10v2004-20220812-en
General
-
Target
ee44620a6b5a3baaffe2ed7b75645a022b7b88b051edc44aa80218d37f984ba0
-
Size
163KB
-
MD5
fb2b1d3d3df04f4cefe032113cdc2ae7
-
SHA1
2afc906bad1ebda0913458d09d7071af66e20d57
-
SHA256
ee44620a6b5a3baaffe2ed7b75645a022b7b88b051edc44aa80218d37f984ba0
-
SHA512
71d506ceaa7d99c75b8f5446e272379270e2241e8c8854dd76ebd0a070d1e88ceb1e19ae208bf38110f2b42e171abe09426740526fdd87516cfa6ef6fec18e46
-
SSDEEP
3072:NNSxN7J6EYziNliU/GRZDLd3e5yqocS1x+DlbyShcIcj:NN2cjuiooDKy3xkl2Shcf
Malware Config
Signatures
Files
-
ee44620a6b5a3baaffe2ed7b75645a022b7b88b051edc44aa80218d37f984ba0.exe windows x86
007b4ed7c3b07e99b2944314a27eba8d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharNextA
GetDesktopWindow
kernel32
VirtualAlloc
RtlMoveMemory
OpenProcess
RemoveDirectoryA
VirtualFree
GetCurrentProcessId
GetCommandLineA
GlobalFindAtomA
GetDriveTypeA
GetCurrentThread
GetThreadLocale
Sections
.text Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Mmlhbkdx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ