Static task
static1
Behavioral task
behavioral1
Sample
68889b67df4163650a1c419a2d2e5ef83e095e48def7a4d0ecb6823beb55d9d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68889b67df4163650a1c419a2d2e5ef83e095e48def7a4d0ecb6823beb55d9d2.exe
Resource
win10v2004-20220812-en
General
-
Target
68889b67df4163650a1c419a2d2e5ef83e095e48def7a4d0ecb6823beb55d9d2
-
Size
880KB
-
MD5
f752bf63380966a22a13a9488af10a2a
-
SHA1
d79eee8ba1f12a8c7f2b865247c5607d355bfa29
-
SHA256
68889b67df4163650a1c419a2d2e5ef83e095e48def7a4d0ecb6823beb55d9d2
-
SHA512
528eac95831c0302a09573a6e98b83f2a443e17d9e2a98b3b2e9d64d134bad20f44a2bc00de24f2cda0223b58939a191eb0b44170ac413bf23dcd041bab37a76
-
SSDEEP
24576:KvknM5S/8OIBivLa36/IxL7VkjF2TtLE6RNX7nf:KkADBQa36/IxL7VwF29lD7f
Malware Config
Signatures
Files
-
68889b67df4163650a1c419a2d2e5ef83e095e48def7a4d0ecb6823beb55d9d2.exe windows x86
e303177a73276332bb361b930b0b82ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReadFile
CreateFileA
LoadLibraryA
lstrcmpA
MultiByteToWideChar
lstrlenA
GetModuleHandleA
GetModuleHandleW
RtlUnwind
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
GetLastError
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
WriteFile
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
SetEndOfFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.sys Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 932KB - Virtual size: 931KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ