Static task
static1
Behavioral task
behavioral1
Sample
be53ccbd57eeabda3b7a9177a7edec537fe730b4569784aab6e9cd2f597c70e6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be53ccbd57eeabda3b7a9177a7edec537fe730b4569784aab6e9cd2f597c70e6.exe
Resource
win10v2004-20220901-en
General
-
Target
be53ccbd57eeabda3b7a9177a7edec537fe730b4569784aab6e9cd2f597c70e6
-
Size
37KB
-
MD5
ab93cf4e3abbabea054780cd992f14d8
-
SHA1
6739419f46857a01b0ad33ded3027e1c04951bb3
-
SHA256
be53ccbd57eeabda3b7a9177a7edec537fe730b4569784aab6e9cd2f597c70e6
-
SHA512
d6547e2d901acef21a49937df8bc4993f4e4cb2fa5a3ba2320578bb6347bda19bd85478cf31c50e8969b58e80cc640c0a5f442cd36718a9f4284ceed90c949b1
-
SSDEEP
768:VsVOtptSDQCKuA3leS6cpnjhONSiakaa/00zK/ukeLs5piBWQusLXni:Vs8TEQzrleBqjhOUivay0hm
Malware Config
Signatures
Files
-
be53ccbd57eeabda3b7a9177a7edec537fe730b4569784aab6e9cd2f597c70e6.exe windows x86
8627e2bb8a87b81ef6679d65b3963eb9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GlobalLock
GlobalUnlock
ReadFile
GetModuleHandleA
GetProcAddress
user32
GetWindowDC
SetActiveWindow
GetFocus
gdi32
EndDoc
LPtoDP
SetMapMode
Sections
PESEC0 Size: 226B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PESEC1 Size: 18KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 467B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ