Static task
static1
Behavioral task
behavioral1
Sample
c351a2cdebc118d16a0cb3332f8e16e4cfd267fb966ac0c9930bf0898db50523.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c351a2cdebc118d16a0cb3332f8e16e4cfd267fb966ac0c9930bf0898db50523.exe
Resource
win10v2004-20220812-en
General
-
Target
c351a2cdebc118d16a0cb3332f8e16e4cfd267fb966ac0c9930bf0898db50523
-
Size
8KB
-
MD5
d2e56982ca2bb5303c157929798fc9e4
-
SHA1
b7eabe875ac67f908e32b90d383b9b666d0926c9
-
SHA256
c351a2cdebc118d16a0cb3332f8e16e4cfd267fb966ac0c9930bf0898db50523
-
SHA512
1747c2f5d414be061636af398a07571f6252554c25dc93910889b2f2244aa081ba8ce1ef35ee7c77ce92da102dba8f10254dccbb4c55e378d2682721ed4f8fb0
-
SSDEEP
96:fcX80DP5xbYwai9v7zFnQHPIwWQCMUl2htznyorXu/774LBS3iUhGtNR:y8oP3N9j94wwAQFXu/774LeiAw
Malware Config
Signatures
Files
-
c351a2cdebc118d16a0cb3332f8e16e4cfd267fb966ac0c9930bf0898db50523.exe windows x86
deb91613ca7190453439fbf9155b6390
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
strlen
kernel32
GetModuleHandleA
HeapCreate
GetCurrentThreadId
HeapDestroy
ExitProcess
GetModuleFileNameA
HeapAlloc
HeapFree
FreeLibrary
LoadLibraryA
GetProcAddress
DeleteFileA
WriteFile
CloseHandle
CreateFileA
SetFilePointer
GetFileSize
ReadFile
HeapReAlloc
user32
GetInputState
PostThreadMessageA
GetMessageA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
Sections
.code Size: 512B - Virtual size: 263B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ