Static task
static1
Behavioral task
behavioral1
Sample
227b53ad332668d5ea0f637f6ebb033d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
227b53ad332668d5ea0f637f6ebb033d.exe
Resource
win10v2004-20220812-en
General
-
Target
227b53ad332668d5ea0f637f6ebb033d.exe
-
Size
2.6MB
-
MD5
227b53ad332668d5ea0f637f6ebb033d
-
SHA1
627acc717c4db9215c0705054708b4c9d2c14a73
-
SHA256
4656f2f8d8f2bc07bb122f1016517cbfac7a5622daefa5dfd434febd1a21b669
-
SHA512
7e35cc6f7022f55378d2f98522d7e1c5922b4cc4fdce4fedba105262c861f7698b1e9802f5c1d35b2483d65b38ef00baa196d6a33e680614995c7b30af11b6cc
-
SSDEEP
49152:Pe8An42lR8vM91WwbF9iH/DMVqezZHMpB8JhSjYGmd:Pe86D8E3k/DMk8JhuYGmd
Malware Config
Signatures
Files
-
227b53ad332668d5ea0f637f6ebb033d.exe.exe windows x86
140094f13383e9ae168c4b35b6af3356
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ExitProcess
GetComputerNameA
GetModuleFileNameA
GetModuleHandleW
GetProcAddress
SetErrorMode
Sleep
VirtualAllocExNuma
shlwapi
PathFindFileNameA
msvcrt
malloc
free
memset
strcmp
_strcmpi
strcpy
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ