Static task
static1
Behavioral task
behavioral1
Sample
bdb0dbf913a83a3763eeebfabc3083224127d042fd1da650b5c42fd5f6226e0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdb0dbf913a83a3763eeebfabc3083224127d042fd1da650b5c42fd5f6226e0f.exe
Resource
win10v2004-20220812-en
General
-
Target
bdb0dbf913a83a3763eeebfabc3083224127d042fd1da650b5c42fd5f6226e0f
-
Size
188KB
-
MD5
74bedf5914f864d035c60072110a96a6
-
SHA1
cd6f00e7988caa9ae281f8f87a4a29c3851f23ce
-
SHA256
bdb0dbf913a83a3763eeebfabc3083224127d042fd1da650b5c42fd5f6226e0f
-
SHA512
2757f45da60954ac2db5475134c6890cde5b11e748e0a9fb1f2da985fb116284bb57eed6c3591f89ffbd5258f39fb623e59acf2b6b26689de49db13e593854cb
-
SSDEEP
3072:OtLVeWryuYDY9gpMTXqmlJVT4oG+FpE80ElgOMRMetqejlI07nfWfzIarOkj2c3m:kVSYWp2XqmfVT4mbE80Elk/17Mkzc34F
Malware Config
Signatures
Files
-
bdb0dbf913a83a3763eeebfabc3083224127d042fd1da650b5c42fd5f6226e0f.exe windows x86
d124ae4396a94f5ccd3982c665fb7d0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GlobalUnlock
GetCommandLineA
GetStartupInfoA
ExitProcess
ntdll
NtSetInformationJobObject
RtlSetTimeZoneInformation
NtSaveMergedKeys
ZwMapUserPhysicalPages
isxdigit
RtlFillMemoryUlong
RtlStringFromGUID
NtAcceptConnectPort
NtOpenProcessToken
NtAllocateLocallyUniqueId
RtlSecondsSince1970ToTime
ZwSetContextThread
ZwRequestDeviceWakeup
ZwSetInformationJobObject
RtlQueryInformationAcl
RtlEnterCriticalSection
RtlAddAccessDeniedObjectAce
Sections
.gdata Size: 4KB - Virtual size: 496KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_PAGELK Size: 181KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1KB - Virtual size: 692B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ