Static task
static1
Behavioral task
behavioral1
Sample
cd4a8237eb0b89de75038630009b1d0e5fc21be0bc7a288e292f59aad0524d2a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cd4a8237eb0b89de75038630009b1d0e5fc21be0bc7a288e292f59aad0524d2a.exe
Resource
win10v2004-20220901-en
General
-
Target
cd4a8237eb0b89de75038630009b1d0e5fc21be0bc7a288e292f59aad0524d2a
-
Size
16KB
-
MD5
93ff9dbaf3371aaeed236fd44ef2b318
-
SHA1
0087774c0bb91c8573f8f5516f46b8eb9092104c
-
SHA256
cd4a8237eb0b89de75038630009b1d0e5fc21be0bc7a288e292f59aad0524d2a
-
SHA512
aed921309bad72636b49f809dbe06396c2120dd10ca5c1c54a91fd8ff41687df40ae9c645d2ec834eaaa7ec2e8b9f45993f2acb5d42a230eb1f912158f26e5af
-
SSDEEP
48:S8GCfyAlW+86Fc9buFoIhS2u/nKkxoyb+BACeBaw+fvamAR5hfi:KAyUW+86FcluFrhqSkOybYY6fvaX5hf
Malware Config
Signatures
Files
-
cd4a8237eb0b89de75038630009b1d0e5fc21be0bc7a288e292f59aad0524d2a.exe windows x86
4e18490470e3e0db18342f426d264dca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
CreateProcessA
Sleep
CloseHandle
GetThreadContext
CreateFileA
lstrcatA
GetTempPathA
FreeConsole
LoadLibraryA
SetThreadContext
ResumeThread
WriteFile
CreateThread
user32
SendMessageA
FindWindowExA
FindWindowA
advapi32
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
shell32
ShellExecuteA
wininet
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
InternetReadFile
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 896B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE