Static task
static1
Behavioral task
behavioral1
Sample
b51f12de3375ae7438a24fe7156555c67855b92b6bac4b38d10e7015226fd202.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b51f12de3375ae7438a24fe7156555c67855b92b6bac4b38d10e7015226fd202.exe
Resource
win10v2004-20220901-en
General
-
Target
b51f12de3375ae7438a24fe7156555c67855b92b6bac4b38d10e7015226fd202
-
Size
274KB
-
MD5
39f656109d4892eb3854d86cf0f4cf01
-
SHA1
00a425b1d23164ae6ff470a52fbb7efd9c7df4d7
-
SHA256
b51f12de3375ae7438a24fe7156555c67855b92b6bac4b38d10e7015226fd202
-
SHA512
4fedde66e49753165340848c7db5476486b2016253df003984256285392df45d1d9464f8ff10ae6f01466db3838eb3c1a44eb7772247b5ff83d0bf55e19fbba3
-
SSDEEP
6144:AHtwNv+E1e4LOWwd793XauWiUqaIJE6MAPMCHcCsvHkYH:etKm2e4SWwLKujBPTUFN
Malware Config
Signatures
Files
-
b51f12de3375ae7438a24fe7156555c67855b92b6bac4b38d10e7015226fd202.exe windows x86
2852a3c7d9d40096f981b2ee9e032d93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GlobalGetAtomNameA
TerminateProcess
MultiByteToWideChar
GetCurrentProcess
GetOEMCP
UnhandledExceptionFilter
VirtualAlloc
WriteFile
GetCPInfo
IsValidCodePage
SetStdHandle
WriteConsoleA
LoadLibraryA
EnumResourceNamesW
EnterCriticalSection
HeapSize
GetTimeFormatA
GetDateFormatA
InitializeCriticalSection
IsDebuggerPresent
HeapReAlloc
SetFilePointer
GetStringTypeA
RtlUnwind
GetACP
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetConsoleOutputCP
GetLocaleInfoA
LeaveCriticalSection
GetCurrentProcessId
RaiseException
shlwapi
SHCreateStreamOnFileW
PathIsFileSpecA
SHCreateStreamOnFileEx
PathAppendA
PathIsContentTypeA
PathCreateFromUrlW
rpcrt4
RpcStringFreeA
Sections
.text Size: 139KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ