Static task
static1
Behavioral task
behavioral1
Sample
4c139965c215e0e2dda5a377114056b8d681343c4e2a37ed116f4e425a7089cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c139965c215e0e2dda5a377114056b8d681343c4e2a37ed116f4e425a7089cc.exe
Resource
win10v2004-20220812-en
General
-
Target
4c139965c215e0e2dda5a377114056b8d681343c4e2a37ed116f4e425a7089cc
-
Size
111KB
-
MD5
2ec8075bef95b7350dfb0f37b9142405
-
SHA1
4fd4d1b02a3fdcef26c13e010619763cbf64d6f2
-
SHA256
4c139965c215e0e2dda5a377114056b8d681343c4e2a37ed116f4e425a7089cc
-
SHA512
9ddd872208f4fdd04bb97496259abf94bd3d32fc955f609e24c868ff74027e9eab9dc8842cc6ad50d967c03b195493f2a975a60b2c5d25a2c791982086e07d32
-
SSDEEP
3072:pdg3LszLu2Ww9MGRJKgRXqB4H9kWk+hCuBs0mH5Rcn7WV:vLu2Ww9RNXqB4HjhCuK0mDcA
Malware Config
Signatures
Files
-
4c139965c215e0e2dda5a377114056b8d681343c4e2a37ed116f4e425a7089cc.exe windows x86
258f82d9909f394c3e6ade6285e28bd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
ReplaceFile
lstrcat
CreateRemoteThread
MoveFileWithProgressA
PrepareTape
WritePrivateProfileStringW
AttachConsole
GetLogicalDrives
SetConsoleCommandHistoryMode
FindResourceExA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 97KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE