Static task
static1
Behavioral task
behavioral1
Sample
07bfa72af257fd281dc04fe7417c3ba3a056a634ee760bd1d01fd1703a73e649.exe
Resource
win7-20220812-en
General
-
Target
07bfa72af257fd281dc04fe7417c3ba3a056a634ee760bd1d01fd1703a73e649
-
Size
52KB
-
MD5
c1b21ea8a9cb3912cd1c483f8d9fbcc2
-
SHA1
7657a2d3d5069673a521e87b72e9d63339560f25
-
SHA256
07bfa72af257fd281dc04fe7417c3ba3a056a634ee760bd1d01fd1703a73e649
-
SHA512
a099c98bb7468316330b8ad73119b9c32734111fc90932d00f0690d81c1b997762360f11780b09c8891af2afd96fdaccb83b175dcbe8992f4ef7be61f4d1268e
-
SSDEEP
768:nHNsHY4/lHyIY8dIRD2oon/TUgXIEKu3FoZWKW7MQh5E:nH2HY4NSIYkou/TuovE
Malware Config
Signatures
Files
-
07bfa72af257fd281dc04fe7417c3ba3a056a634ee760bd1d01fd1703a73e649.exe windows x86
4838218fbc607a55321a45adbfa5070b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
CloseHandle
CreateFileA
DeleteFileA
CreateProcessA
GetTempPathA
GetModuleFileNameA
HeapAlloc
HeapFree
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetLastError
WriteFile
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
SetHandleCount
GetStdHandle
GetFileType
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
RtlUnwind
FlushFileBuffers
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetEndOfFile
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE