Static task
static1
Behavioral task
behavioral1
Sample
017463163d98f8c5166cbcf04493708ad210bb09bc567ede8c22e5a899231b45.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
017463163d98f8c5166cbcf04493708ad210bb09bc567ede8c22e5a899231b45.exe
Resource
win10v2004-20220901-en
General
-
Target
017463163d98f8c5166cbcf04493708ad210bb09bc567ede8c22e5a899231b45
-
Size
8KB
-
MD5
82f49e409984d5a855c1a5399fca70d2
-
SHA1
29495d4033177d56aed8d05b48e4a67fc2a08dd5
-
SHA256
017463163d98f8c5166cbcf04493708ad210bb09bc567ede8c22e5a899231b45
-
SHA512
fcd9865421a074606af760c752df27b78403ab0efa09e6c34e94877f24f87f1fedf5a1265f615ae5d43a2a037b610befffc7918bf42ee017941bc17507c89dea
-
SSDEEP
192:jGLVywxRdY5CdjA+a4t2sOxBbBr7wDBc:CvY5qT2VblgG
Malware Config
Signatures
Files
-
017463163d98f8c5166cbcf04493708ad210bb09bc567ede8c22e5a899231b45.exe windows x86
c70fc1791e52f2b85087d26377640c2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strlen
memcpy
strcpy
strcat
kernel32
GetModuleHandleA
HeapCreate
GetWindowsDirectoryA
HeapDestroy
ExitProcess
Sleep
HeapAlloc
InitializeCriticalSection
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
shell32
ShellExecuteExA
Sections
.code Size: 512B - Virtual size: 439B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 512B - Virtual size: 7B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE