Static task
static1
Behavioral task
behavioral1
Sample
11b76f59452efbca118b8ebc2478be84c70945a851911a1a5b7220691af6704c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
11b76f59452efbca118b8ebc2478be84c70945a851911a1a5b7220691af6704c.exe
Resource
win10v2004-20220414-en
General
-
Target
11b76f59452efbca118b8ebc2478be84c70945a851911a1a5b7220691af6704c
-
Size
175KB
-
MD5
77b76cd9351ac9d3cfc7fb5a7ddd505c
-
SHA1
9fac5e34d44b515538f9c4343b9c15304b127aba
-
SHA256
11b76f59452efbca118b8ebc2478be84c70945a851911a1a5b7220691af6704c
-
SHA512
5581df002694ad755ad1954bc2c81ab9ce275b99fc7c355971378de103caf20e8e337fcb07189dd11a35e58fd6bebf221c965be3d6723c0e789b3c20a9d7f6a5
-
SSDEEP
3072:n0Hwb+3ngtcUOORwzbtWjBBhdCd9k1/FfsPhT/IApdpRk/2:0Qb+3gGURazw89URsJpD
Malware Config
Signatures
Files
-
11b76f59452efbca118b8ebc2478be84c70945a851911a1a5b7220691af6704c.exe windows x86
fde29a88ff8bd33260730ad3942de78f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetSystemTimeAsFileTime
msvcr80
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_crt_debugger_hook
_adjust_fdiv
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
_invoke_watson
_controlfp_s
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
atoi
Sections
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ