Static task
static1
Behavioral task
behavioral1
Sample
d4e64f5e05a3134ddc123fc94de425decea55f069d1445881aaec8cfaf0e34c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4e64f5e05a3134ddc123fc94de425decea55f069d1445881aaec8cfaf0e34c0.exe
Resource
win10v2004-20220812-en
General
-
Target
d4e64f5e05a3134ddc123fc94de425decea55f069d1445881aaec8cfaf0e34c0
-
Size
11KB
-
MD5
1219a9ade46298ab8f02fee7d3820a4b
-
SHA1
54ac534879cb0e0e3ee4691e9a0313a70a198abb
-
SHA256
d4e64f5e05a3134ddc123fc94de425decea55f069d1445881aaec8cfaf0e34c0
-
SHA512
6f397158b04ee373e22eb1cb13545eee60d064716400045e8aecd6c379aaaa6d4f7faa7f2480f5a1fc12447945f270ba45e59cb8bba3a5f18f2e95cf9266354a
-
SSDEEP
192:vklPPRpuUv06QJ1Hp/APRJEkhvch75CKN00Xh4ELps:4PRDvKHtkhECKO0Xh4EL
Malware Config
Signatures
Files
-
d4e64f5e05a3134ddc123fc94de425decea55f069d1445881aaec8cfaf0e34c0.exe windows x86
690605e32c06fee77e385106844c46ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
GlobalFree
GlobalReAlloc
CloseHandle
GetThreadContext
SetThreadContext
GetCommandLineA
ReadProcessMemory
CreateProcessA
GetProcAddress
VirtualProtectEx
VirtualAllocEx
LoadLibraryA
OpenThread
GetSystemInfo
ContinueDebugEvent
WaitForDebugEvent
WriteProcessMemory
FlushInstructionCache
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 574B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 994B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ