Static task
static1
Behavioral task
behavioral1
Sample
d48529fd4474a0d7729442b55048b6ad4849edf2daf044d79ae6ccf7e8ea9eea.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d48529fd4474a0d7729442b55048b6ad4849edf2daf044d79ae6ccf7e8ea9eea.exe
Resource
win10v2004-20220812-en
General
-
Target
d48529fd4474a0d7729442b55048b6ad4849edf2daf044d79ae6ccf7e8ea9eea
-
Size
326KB
-
MD5
7398fb08ffdb3f2336015fdf671265f4
-
SHA1
1ca8d67f3bcfab3596d165a76d3a7276352827b7
-
SHA256
d48529fd4474a0d7729442b55048b6ad4849edf2daf044d79ae6ccf7e8ea9eea
-
SHA512
122c5b17350a8bd819a576792cfc15332cb388e713f1d002d3f9441487763f787ab6921084f4062d57973d8863ff7c9acceec01b29375f995b4a427175956671
-
SSDEEP
6144:6YM5EZFYtgLUrGJj9bpUkBDBZ4794WoMTmQepG6hv8P5WfQTWlCAaQrG+:6n56FkgLFtB2x4TfLhUhWIECAaQt
Malware Config
Signatures
Files
-
d48529fd4474a0d7729442b55048b6ad4849edf2daf044d79ae6ccf7e8ea9eea.exe windows x86
b93b04d00ae524b6d1fbabf2ee65827c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Heap32First
IsBadStringPtrA
lstrlenA
GetCommandLineA
LoadLibraryExW
GetStdHandle
SetLastError
TlsGetValue
FreeConsole
CloseHandle
GetConsoleTitleA
GetModuleHandleA
GetLastError
VirtualProtect
CancelIo
IsBadReadPtr
ResetEvent
GetDiskFreeSpaceExA
EnumResourceTypesW
LocalFree
user32
DispatchMessageA
GetMessageA
IsIconic
CreateMenu
CreateWindowExA
GetUpdateRect
CloseWindow
EnableWindow
DialogBoxParamA
DragDetect
CopyImage
GetKeyState
GetScrollBarInfo
MessageBoxA
hlink
HlinkCreateFromString
HlinkCreateFromData
HlinkResolveShortcut
HlinkClone
HlinkOnNavigate
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ