Static task
static1
Behavioral task
behavioral1
Sample
95518945c9fc1a7047b9347ef23e9753396668f6d5f9b11f73e47769bbeb46dd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
95518945c9fc1a7047b9347ef23e9753396668f6d5f9b11f73e47769bbeb46dd.exe
Resource
win10v2004-20220812-en
General
-
Target
95518945c9fc1a7047b9347ef23e9753396668f6d5f9b11f73e47769bbeb46dd
-
Size
320KB
-
MD5
5d9481b995ebcf85967f43725d965040
-
SHA1
1eabdec26c6cd38c1daa01e165a1c1e221ae989d
-
SHA256
95518945c9fc1a7047b9347ef23e9753396668f6d5f9b11f73e47769bbeb46dd
-
SHA512
a770920695d9b264c0d335a6c2dc31ecf4ae928a12122aa783ac97f3f2a79da7e4e0960ac2f62c72ec3f773c6bce9424163ed57613da8966a2ceee0f1ff8c03a
-
SSDEEP
6144:p0SqwObDWrABH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:w5bDWrw2EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
95518945c9fc1a7047b9347ef23e9753396668f6d5f9b11f73e47769bbeb46dd.exe windows x86
21900649527855cb7b6314da94ee21d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCalendarInfoW
CreateFileMappingW
DeleteTimerQueueEx
RtlFillMemory
ReleaseSemaphore
GetSystemInfo
SetProcessPriorityBoost
GetTempFileNameW
Toolhelp32ReadProcessMemory
DeviceIoControl
WriteProfileStringA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE