Static task
static1
Behavioral task
behavioral1
Sample
ed711d3adbc9ed764143289bb3422ad8491ccc36b4f145fb58e45121f06bcf57.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed711d3adbc9ed764143289bb3422ad8491ccc36b4f145fb58e45121f06bcf57.exe
Resource
win10v2004-20220901-en
General
-
Target
ed711d3adbc9ed764143289bb3422ad8491ccc36b4f145fb58e45121f06bcf57
-
Size
64KB
-
MD5
825100530645cda409fff6b682453324
-
SHA1
abe3a98061a53692e0d983b5b0cb3917c3485d4c
-
SHA256
ed711d3adbc9ed764143289bb3422ad8491ccc36b4f145fb58e45121f06bcf57
-
SHA512
e1dca1f20559824babc34f7647e21be58e82e098a33db2d01ddf748ea0497a25ce4a8e581680f6c43ba2055a0308d712480c55dd0bd9b112d3a2e59933e49fa8
-
SSDEEP
768:DPPcPwKVZ1woo+SEpOqgDSerts0uIJ9kWR2nrjDEP/XkHRIlxclFM7NBkREJoO:zPwZ1pyE8U3Dw/XkHRi2jM7NCGJoO
Malware Config
Signatures
Files
-
ed711d3adbc9ed764143289bb3422ad8491ccc36b4f145fb58e45121f06bcf57.exe windows x86
21ac21093f1654a504129a58f6a3f575
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msctf
TF_CreateLangBarMgr
TF_CreateThreadMgr
TF_UninitSystem
TF_InitSystem
kernel32
DisconnectNamedPipe
SetCurrentDirectoryA
GetModuleHandleA
HeapCreate
QueryDosDeviceA
GetConsoleAliasA
OpenMutexA
CreateSemaphoreA
GetBinaryTypeA
CompareStringA
FindResourceA
GetFullPathNameA
GetCurrentDirectoryA
FindResourceA
VirtualQuery
GetProcessHeap
CreateMailslotA
GetPrivateProfileSectionA
SetFileAttributesA
EncodeSystemPointer
CreateTimerQueue
IsBadWritePtr
CancelIo
IsBadCodePtr
MoveFileA
IsBadStringPtrA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 900B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 794B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ