Static task
static1
Behavioral task
behavioral1
Sample
a7f53c1f512fd70a751513eb705a90b513bf00de6ae21e5496315ad071236197.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a7f53c1f512fd70a751513eb705a90b513bf00de6ae21e5496315ad071236197.exe
Resource
win10v2004-20220901-en
General
-
Target
a7f53c1f512fd70a751513eb705a90b513bf00de6ae21e5496315ad071236197
-
Size
29KB
-
MD5
18e1e771b4bfb719b225bbef95387450
-
SHA1
32d08d8b26125e3c424ac6e323503cd8b57c4961
-
SHA256
a7f53c1f512fd70a751513eb705a90b513bf00de6ae21e5496315ad071236197
-
SHA512
32261852cf5e7cd57bbf6486d0dee261e785b610274c3be7a89ba8f7c8c9f90bd7d87f2800d44026ae2ca674c51323c48a759c0e2e7e19ce9f71ee9f0f02a9ea
-
SSDEEP
384:5EUFU4V2sQbZxGWdomKDYvLvTuBkKCkpnQ6/vwSC6g5EM2nmBCU95jCIs9W8/Ar5:5HF/GxYTDYTvyBzz/DtM+2L5jCv9PA5
Malware Config
Signatures
Files
-
a7f53c1f512fd70a751513eb705a90b513bf00de6ae21e5496315ad071236197.exe windows x86
abae89c6f735f476276bbbc2bfdcdd9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetThreadContext
WriteProcessMemory
VirtualAllocEx
GetProcAddress
GetModuleHandleA
ResumeThread
GetThreadContext
VirtualAlloc
CreateProcessA
GetLocalTime
LoadLibraryA
ReadProcessMemory
OutputDebugStringA
HeapAlloc
GetStartupInfoA
GetCommandLineA
ExitProcess
GetProcessHeap
advapi32
RegQueryValueA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ