Static task
static1
Behavioral task
behavioral1
Sample
d46eada308c7a3ee98f89f5d7bc94106b6f446b0190b1f91c9622c3605a8a346.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d46eada308c7a3ee98f89f5d7bc94106b6f446b0190b1f91c9622c3605a8a346.exe
Resource
win10v2004-20220812-en
General
-
Target
d46eada308c7a3ee98f89f5d7bc94106b6f446b0190b1f91c9622c3605a8a346
-
Size
121KB
-
MD5
5d12545f8fb5839d8c3230968d49b40b
-
SHA1
de792df44e7328105a4335088ebe042375eaafd5
-
SHA256
d46eada308c7a3ee98f89f5d7bc94106b6f446b0190b1f91c9622c3605a8a346
-
SHA512
88129aa87173310f8a9f0e3993d130a9e0b85616250534b192e683a552cf39531ff2463c6f881e492c7d0f1da256d39feda1730608de89d59ed6957579476233
-
SSDEEP
3072:gJv9//ck/ow4Nkt6SDij5qgz5B+Sxjol:gJvlUkH4St6V8C+S
Malware Config
Signatures
Files
-
d46eada308c7a3ee98f89f5d7bc94106b6f446b0190b1f91c9622c3605a8a346.exe windows x86
7e077f719e7ae7e00262f43ee35b2359
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
FormatMessageW
HeapAlloc
SetUnhandledExceptionFilter
SetUnhandledExceptionFilter
InterlockedDecrement
InitializeCriticalSection
Sleep
GetModuleHandleA
WaitForSingleObject
GetCommandLineW
GetVersionExA
LocalAlloc
GetStartupInfoW
LoadLibraryW
CreateThread
WaitForSingleObject
GetCurrentProcessId
ReadFile
CreateThread
GetACP
VirtualAlloc
SetFilePointer
InitializeCriticalSection
ExitProcess
LocalAlloc
lstrcpyW
LocalFree
MultiByteToWideChar
GetModuleHandleA
CloseHandle
GetModuleFileNameA
WaitForSingleObject
GetProcAddress
SetUnhandledExceptionFilter
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCommandLineA
HeapFree
GetLastError
LoadLibraryA
LeaveCriticalSection
FormatMessageW
GetACP
HeapDestroy
SetUnhandledExceptionFilter
GetCurrentThreadId
Sleep
CloseHandle
VirtualAlloc
ExitProcess
LoadLibraryA
GetCommandLineW
DeleteCriticalSection
GetProcAddress
InterlockedDecrement
UnhandledExceptionFilter
GetTickCount
LoadLibraryW
SetEvent
GetStartupInfoW
GetLastError
InitializeCriticalSection
FreeLibrary
VirtualAlloc
GetCurrentProcessId
DeleteCriticalSection
LeaveCriticalSection
SetFilePointer
Sleep
GetModuleHandleA
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
CreateThread
InterlockedIncrement
FormatMessageW
LocalAlloc
SetFilePointer
TerminateProcess
GetCommandLineA
ExitProcess
FreeLibrary
lstrlenW
GetModuleHandleW
GetModuleHandleW
GetCommandLineW
SetFilePointer
HeapDestroy
VirtualFree
GetCurrentThreadId
GetStartupInfoW
DeleteCriticalSection
WideCharToMultiByte
CreateThread
VirtualAlloc
TerminateProcess
Sections
.text Size: 109KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE