Static task
static1
Behavioral task
behavioral1
Sample
48e883e4e4b166c93d2ec32c57d3578dd61a981032d034027f7585e5efe9ae42.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48e883e4e4b166c93d2ec32c57d3578dd61a981032d034027f7585e5efe9ae42.exe
Resource
win10v2004-20220812-en
General
-
Target
48e883e4e4b166c93d2ec32c57d3578dd61a981032d034027f7585e5efe9ae42
-
Size
19KB
-
MD5
3a924c842f44e0065d9583e2670df0f6
-
SHA1
47e853732ea919f2eaf438292a182b96902ce8b6
-
SHA256
48e883e4e4b166c93d2ec32c57d3578dd61a981032d034027f7585e5efe9ae42
-
SHA512
8efb2a74449a2070255f1054372d6c38312f1c7e98e921a65091ab8f005b3f73c90f23c0874468d20dd692159e6d522d400bd47180dbd39940be1db9acea52ad
-
SSDEEP
192:tjHwysSOwibeIUQE4HwjF6ZdlvgkPVUMqcHqpY3Y6HCHoqyXwT4/A5rt40Z4P1K7:R+qIKI/3lv2Mql63XwTRk06Nm0fG
Malware Config
Signatures
Files
-
48e883e4e4b166c93d2ec32c57d3578dd61a981032d034027f7585e5efe9ae42.exe windows x86
6335331fbcee1319f8959d569da988fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CommConfigDialogA
ConvertDefaultLocale
CreateDirectoryExA
CreateEventW
CreateHardLinkA
DeleteTimerQueueTimer
EnterCriticalSection
EnumDateFormatsExA
EnumUILanguagesA
FindAtomW
FindFirstVolumeW
FindNextVolumeMountPointW
FindResourceW
FormatMessageW
FreeLibrary
FreeLibraryAndExitThread
FreeResource
GetBinaryTypeW
GetConsoleAliasExesW
GetConsoleCP
GetConsoleTitleA
GetCurrencyFormatA
GetCurrencyFormatW
GetDiskFreeSpaceExA
GetExitCodeProcess
GetNamedPipeHandleStateW
GetNamedPipeInfo
GetOEMCP
GetProcessAffinityMask
GetSystemTime
GetThreadLocale
GetVolumeInformationA
GlobalAddAtomW
GlobalFlags
GlobalGetAtomNameA
HeapCreate
HeapUnlock
LocalHandle
LocalUnlock
LockResource
CancelIo
OpenWaitableTimerA
Process32NextW
PulseEvent
QueueUserWorkItem
ReadConsoleOutputCharacterW
ReadFileScatter
ResetEvent
SetDefaultCommConfigA
SetEvent
SetHandleCount
SetLocaleInfoW
SetStdHandle
SetTapeParameters
SetThreadContext
SetVolumeLabelA
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TransmitCommChar
TryEnterCriticalSection
UnmapViewOfFile
VirtualFreeEx
WaitForSingleObject
WriteFile
WritePrivateProfileStringW
WritePrivateProfileStructW
WriteProfileSectionW
_lopen
lstrcatW
lstrcmpi
lstrcpy
lstrcpyW
lstrlenA
VirtualAlloc
CreateFileA
CreateFileW
LoadLibraryW
GetProcAddress
GetWindowsDirectoryW
GetStartupInfoA
MoveFileExA
CallNamedPipeW
advapi32
RegOpenKeyExA
msvcrt
memcpy
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ