Static task
static1
Behavioral task
behavioral1
Sample
30d79da1a58cef35c819983d3a670881a6613cdb5a76d2f3d1078b23df2c58e2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
30d79da1a58cef35c819983d3a670881a6613cdb5a76d2f3d1078b23df2c58e2.exe
Resource
win10v2004-20220812-en
General
-
Target
30d79da1a58cef35c819983d3a670881a6613cdb5a76d2f3d1078b23df2c58e2
-
Size
279KB
-
MD5
40355bec7da4b2065817f9f7b690fb00
-
SHA1
db9ec5520b78567ebe4b70bf0b4037d3452bfd4e
-
SHA256
30d79da1a58cef35c819983d3a670881a6613cdb5a76d2f3d1078b23df2c58e2
-
SHA512
f4040ca745fd1af2eb890c01a5abd579b877702aa6bc8aa9fb8be1092ee43ab29c47bba7008ba755e92c95ebf1e084332b6c9fd309b56748c418f1ae9439f82a
-
SSDEEP
6144:jAHIoQlsMNaORJN02BMp1cNFYrxJ1p4O2bpegBW5LeMZTmYTGiYuuux:jyIoKaAPnOpONFs1n2f6dpr
Malware Config
Signatures
Files
-
30d79da1a58cef35c819983d3a670881a6613cdb5a76d2f3d1078b23df2c58e2.exe windows x86
cc2914eef51544f3e055e15beabcd2f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
w32topl
ToplScheduleCreate
ToplScheduleDuration
ToplScheduleExportReadonly
ToplSTHeapExtractMin
ToplSTHeapInit
ToplSTHeapDestroy
ToplScheduleCacheCreate
ToplScheduleCacheDestroy
fmifs
Extend
Chkdsk
DiskCopy
Format
ComputeFmMediaType
FormatEx
EnableVolumeCompression
kernel32
lstrlenW
GetSystemTimeAsFileTime
QueryPerformanceCounter
HeapFree
GetTickCount
LoadLibraryA
GetLocaleInfoW
GetCurrentProcessId
GetOEMCP
WideCharToMultiByte
CreateFileA
HeapAlloc
FindResourceW
GetProcessHeap
GlobalFindAtomA
lstrcpyW
MultiByteToWideChar
SetLastError
SetUnhandledExceptionFilter
GetCurrentProcess
CloseHandle
GetLocalTime
SystemTimeToFileTime
lstrcmpA
Sections
.text Size: 273KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ