Static task
static1
Behavioral task
behavioral1
Sample
54ba16ee475e85dc51410512b03a202b3e9baf2654ac977d9ef8c363c7c83863.exe
Resource
win7-20220901-en
General
-
Target
54ba16ee475e85dc51410512b03a202b3e9baf2654ac977d9ef8c363c7c83863
-
Size
95KB
-
MD5
4f99bc4dddf896fe16e693c675ce8c00
-
SHA1
0f69750a0c6f133b00d8b22c9ef4d1a985f6d1fb
-
SHA256
54ba16ee475e85dc51410512b03a202b3e9baf2654ac977d9ef8c363c7c83863
-
SHA512
e9c0534a8ad540cc11d5ce99a82ff39a2c3db4606a314fc1bc0e22b6c1288839049eb03e26eadca7a9fe6b9ae7979eda557af9912a577c81af00e738bba67a0c
-
SSDEEP
1536:rd8TICuBckF9o8qrgLNmF2jbxWGq6emF2jbxWGq6n:rd81kDo8U2NS2jbxWGqrS2jbxWGq0
Malware Config
Signatures
Files
-
54ba16ee475e85dc51410512b03a202b3e9baf2654ac977d9ef8c363c7c83863.exe windows x86
92ef58eb21412bf2b1d556259d8d27aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
CloseHandle
CopyFileA
CreateDirectoryA
CreateDirectoryExA
CreateFileA
CreateProcessA
DeleteFileA
ExpandEnvironmentStringsA
FindClose
FindNextFileA
FreeLibrary
GetCurrentProcess
GetExitCodeProcess
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetPrivateProfileStringA
VirtualAlloc
GetShortPathNameA
GetSystemDirectoryA
GetVersionExA
GlobalAlloc
GlobalFree
IsDBCSLeadByte
LoadLibraryA
MultiByteToWideChar
ReadFile
SetFileAttributesA
SetFilePointer
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
GetProcAddress
CreateFileW
user32
LoadIconA
LoadIconW
LoadCursorW
advapi32
RegOpenKeyExA
msvcrt
memcpy
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ