Static task
static1
Behavioral task
behavioral1
Sample
21188c9ab49eef4d3876ae7a9d9c1745b2aca6e601a2df339873e9cf482f9b5c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21188c9ab49eef4d3876ae7a9d9c1745b2aca6e601a2df339873e9cf482f9b5c.exe
Resource
win10v2004-20220901-en
General
-
Target
21188c9ab49eef4d3876ae7a9d9c1745b2aca6e601a2df339873e9cf482f9b5c
-
Size
78KB
-
MD5
c365957018fe590b351ec97d25f9621f
-
SHA1
434b9fc4f9d7ec821ad3ba7ef32b22b5c0d7ea42
-
SHA256
21188c9ab49eef4d3876ae7a9d9c1745b2aca6e601a2df339873e9cf482f9b5c
-
SHA512
74f9128837b66609d4ac8dfd2c88172ba22aa9a0c66cfa738923b6bcbbc6eadc1facee85f79ebbeae025aba1a081eafd2a7cf5ed65b32f43e932f48ac64989f5
-
SSDEEP
768:VLZb2tbkQvbxhWgLhIBKL9Bc/RWGN8jK+:VL4tbkQvDWgSBMBcpWvjB
Malware Config
Signatures
Files
-
21188c9ab49eef4d3876ae7a9d9c1745b2aca6e601a2df339873e9cf482f9b5c.exe windows x86
9ddd94444ea7156217169d9ad049369b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryW
lstrcatW
CreateFileW
LoadLibraryA
GetProcAddress
VirtualAllocEx
CloseHandle
advapi32
RegCloseKey
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data6 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data5 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ