Static task
static1
Behavioral task
behavioral1
Sample
ed454159d9143ffeff6c6ae16361f2845524813906b1426fb8dbb3321bba9595.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ed454159d9143ffeff6c6ae16361f2845524813906b1426fb8dbb3321bba9595.exe
Resource
win10v2004-20220901-en
General
-
Target
ed454159d9143ffeff6c6ae16361f2845524813906b1426fb8dbb3321bba9595
-
Size
153KB
-
MD5
b439ef34a6d4d55aeaec4d528d726d0b
-
SHA1
51d16d6dcfa2b9e5835f33b2d7ad745e6c236416
-
SHA256
ed454159d9143ffeff6c6ae16361f2845524813906b1426fb8dbb3321bba9595
-
SHA512
e6c17d432796d805857fa994d23c61a2f8730e9ad229e9ddb7ec843ea73ad2d5e530b9342ab383369795d02fdf49a5ee76f4f55bf973590c784cec126aa75d29
-
SSDEEP
3072:r7HqSSbSRcC3S1ZmqcNYDTSS5Gc+ila5pL1Ckmv5R97bvO1pD:PHq/RCmm0L59I1jmjq
Malware Config
Signatures
Files
-
ed454159d9143ffeff6c6ae16361f2845524813906b1426fb8dbb3321bba9595.exe windows x86
ce21a577e3c317cbb35d0c65c942c5d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
HeapAlloc
SetUnhandledExceptionFilter
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_fmode
_fpreset
_iob
_onexit
_setmode
abort
atexit
fflush
fprintf
free
malloc
signal
ntdll
NtYieldExecution
memset
strlen
wcslen
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE