Static task
static1
Behavioral task
behavioral1
Sample
21fe2e1157f0bd9ff2d403b89eefd2eb125a98738caf095935c3db67deb2c73e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21fe2e1157f0bd9ff2d403b89eefd2eb125a98738caf095935c3db67deb2c73e.exe
Resource
win10v2004-20220812-en
General
-
Target
21fe2e1157f0bd9ff2d403b89eefd2eb125a98738caf095935c3db67deb2c73e
-
Size
32KB
-
MD5
1afe1d9c81fdfe7ee1d55bd0569e2aae
-
SHA1
e2c13f3ec715590e241cdaa4686d4feef1683e07
-
SHA256
21fe2e1157f0bd9ff2d403b89eefd2eb125a98738caf095935c3db67deb2c73e
-
SHA512
a2632b53fde814659537781af4747b860b045ab6718bb521432b6ed151bbb479bffeccf06e91f0258d36fa2a7cfbc5c598d24f72e28149e0742f6251c8b467ac
-
SSDEEP
192:gO4o4GreaoL8c1G7P1oynE+9pJKEDFhgm/1lHmTAZbebAtMGV18gg:74o4+epQ/D1i+9bfvgm/1lHmzTGf8
Malware Config
Signatures
Files
-
21fe2e1157f0bd9ff2d403b89eefd2eb125a98738caf095935c3db67deb2c73e.exe windows x86
2de711cc410e1c08a8508e229c0d8f60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
ShellExecuteA
msvcrt
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
_acmdln
__p__fmode
_access
_except_handler3
_controlfp
exit
_XcptFilter
_exit
strchr
strlen
strcpy
strcat
fopen
fprintf
fclose
strrchr
memset
sprintf
__p__commode
__set_app_type
kernel32
GetModuleHandleA
GetStartupInfoA
CreateFileA
CloseHandle
GetFileTime
SetFileTime
GetWindowsDirectoryA
DeleteFileA
FindFirstFileA
CopyFileA
FindNextFileA
FindClose
GetModuleFileNameA
GetVersionExA
WinExec
Sleep
Sections
.text Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE