Static task
static1
Behavioral task
behavioral1
Sample
a1ed1e6abee43cbfe7846d5bca32ccbf382386539a80ea8860e443986aa6df44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1ed1e6abee43cbfe7846d5bca32ccbf382386539a80ea8860e443986aa6df44.exe
Resource
win10v2004-20220812-en
General
-
Target
a1ed1e6abee43cbfe7846d5bca32ccbf382386539a80ea8860e443986aa6df44
-
Size
24KB
-
MD5
c9175ac4bd127d6d10b46b3e4783569d
-
SHA1
4cf879420e6a3f85086d5426ebe251a5b70f00eb
-
SHA256
a1ed1e6abee43cbfe7846d5bca32ccbf382386539a80ea8860e443986aa6df44
-
SHA512
22887326cfc1b90f5a04f48ba1fe1e3e38cc89d794422001feea093a9d50baef422086e94c4993c05e4ee8c229feddaf4e854e5fb9ebc1f6cbaf13a23070580f
-
SSDEEP
192:S0vKLNBCgc35Su6V/YJs0nuVoeVqFoZuT+4JzH067iqWFcKqcyWXeTuW7sg0q0i2:SwknPoF0cUPRcKqQXlW710HipIp
Malware Config
Signatures
Files
-
a1ed1e6abee43cbfe7846d5bca32ccbf382386539a80ea8860e443986aa6df44.exe windows x86
514849b92c1a32e3568cc9fc72495ca5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
GetProcessHeap
HeapAlloc
RtlUnwind
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
user32
MessageBoxW
advapi32
RegOpenKeyExW
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 602B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 932B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 512B - Virtual size: 25B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ