Static task
static1
Behavioral task
behavioral1
Sample
Process Hacker 3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Process Hacker 3.exe
Resource
win10v2004-20220812-en
General
-
Target
Process Hacker 3.exe
-
Size
7KB
-
MD5
f199fbc3459c979470f3a1bd5764b433
-
SHA1
4035bcea306e117e85ceda520a88f847a39e7369
-
SHA256
cf8b2f3f816f82b0244a49665321597b3228d238d40a46966d3279732025369c
-
SHA512
31a541c3a462b9e91bd9fa8eaa6f1f6c77c6ce6016401e54bb21da95733e3c831d67a62b908d522c7cad7c9ab828a0a45a33a644523d72ee751528581ae01dc8
-
SSDEEP
96:ObyJiub+RP39xucmsHUrTn4uw9t0AJtnU13rP3CzkKe8l6gb6Gn6q6ozNt:lrIru1rTn4H9GIhEP3CIKe09jnh1
Malware Config
Signatures
Files
-
Process Hacker 3.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ