Static task
static1
Behavioral task
behavioral1
Sample
f4463bf6de6548a671e74f93a3f4479d7397157948f4cd1ebeb14f70de283086.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f4463bf6de6548a671e74f93a3f4479d7397157948f4cd1ebeb14f70de283086.exe
Resource
win10v2004-20221111-en
General
-
Target
f4463bf6de6548a671e74f93a3f4479d7397157948f4cd1ebeb14f70de283086
-
Size
14KB
-
MD5
5b610ae990f27550099ec38b293a4c16
-
SHA1
018a033df472c4024030bdcd5f85ea334e5f8e80
-
SHA256
f4463bf6de6548a671e74f93a3f4479d7397157948f4cd1ebeb14f70de283086
-
SHA512
3d17cd7d3f171181592379fb71c248310b959b8f0f7fdee597a89e44604ee3de0107fcdf7172170330fb7a50179c70776371c460a108f792e208c3cb0bfb5921
-
SSDEEP
192:ZLvOApFuOa3X30044lcXjrIW+w/wjedp1igid/wH86xOvbeu:ZrZak044lcXjreiU6Gd4H86UvbX
Malware Config
Signatures
Files
-
f4463bf6de6548a671e74f93a3f4479d7397157948f4cd1ebeb14f70de283086.exe windows x86
2cb40f7956685758def41c4a204f65ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetStartupInfoW
GetStartupInfoA
ConvertThreadToFiber
CreateFileW
ExitProcess
MapUserPhysicalPagesScatter
ReadConsoleOutputAttribute
ReadFileEx
WaitForMultipleObjects
FormatMessageW
GetModuleHandleW
msvcrt
memset
advapi32
RegOpenKeyA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ