Static task
static1
General
-
Target
MDE_File_Sample_8f41a4054f8c4f3263ab10aadc7864190702d9eb (1).zip
-
Size
58KB
-
MD5
f612171c08520b71cc692bf864dfc940
-
SHA1
535a1ff4088f5aa63ff050402008c5cdae2398b6
-
SHA256
e3476b60cd5c7d2a3813432b866b489bd381d8c9a08d9d9f75fdd3673ea4ec16
-
SHA512
7ebaeb62c7de9e4b40ef4d63d09094a2d3a57d306cc9b086d63c0a63dfe59511aa31c2c07790e617c099cef57e7956c1269e36f02402b24689f674640c8f0caa
-
SSDEEP
1536:ofPrO42eV7kvvCjbMHjy4uFyV2BO2v3kqXYYve:ofT52eV7WDHGjFyqOEk8YYve
Malware Config
Signatures
Files
-
MDE_File_Sample_8f41a4054f8c4f3263ab10aadc7864190702d9eb (1).zip.zip
Password: infected
-
Defender detected and quarantined 'HackTool:Win32/Keygen' in file 'nitropro_117157.rar->nitropdf.enterprise.pro.11.xx-Upd1.patch.rar->nitropdf.enterprise.pro.x64.11.xx-Upd1.patch.exe' during an on-demand scan.exe windows x86
dc73a9bd8de0fd640549c85ac4089b87
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
ExitProcess
FindResourceA
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
RtlMoveMemory
SizeofResource
VirtualAlloc
lstrcatA
CloseHandle
CreateFileA
FlushFileBuffers
WriteFile
Sections
.text Size: 512B - Virtual size: 502B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 472B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 82B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ