Static task
static1
Behavioral task
behavioral1
Sample
307a8f5b4daef4d65513d567a6b538a78bd7c4296821f757a25cd507979ad7d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
307a8f5b4daef4d65513d567a6b538a78bd7c4296821f757a25cd507979ad7d4.exe
Resource
win10v2004-20220901-en
General
-
Target
307a8f5b4daef4d65513d567a6b538a78bd7c4296821f757a25cd507979ad7d4
-
Size
43KB
-
MD5
7748097f49b8ceb9221f9c35312e7021
-
SHA1
5aacaa8d898d7b16eb806aae090dd76e8e872d82
-
SHA256
307a8f5b4daef4d65513d567a6b538a78bd7c4296821f757a25cd507979ad7d4
-
SHA512
4e254e4a7e1bc43860d1ebce45a51428f4d671ee211763a216169351fdd2d41e74a8bb6708fb165b0d2bb8ca6a6a8fcae47c1adfb6ce7e443adb2a69ce7aa7cd
-
SSDEEP
384:rp1qvcx1azV50/uP9T6O5uk8TdjRN+f7vuBuLR8jhAlpt0Wk3W/64qvM:rp0kx1IVSu9CdiwokhepwOcM
Malware Config
Signatures
Files
-
307a8f5b4daef4d65513d567a6b538a78bd7c4296821f757a25cd507979ad7d4.exe windows x86
be40d9d8911a3316440a1202a8ccf84f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
HeapDestroy
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetCommandLineA
HeapCreate
VirtualFree
RtlUnwind
WriteFile
VirtualAlloc
GetProcAddress
LoadLibraryA
GetLastError
FlushFileBuffers
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
SetFilePointer
SetStdHandle
SetEndOfFile
ReadFile
rpcrt4
UuidToStringA
UuidCreate
RpcStringFreeA
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE