Static task
static1
Behavioral task
behavioral1
Sample
ed578c0d28c3baed55f0496b94da503283db73ea4ef28c8b6502f7f0dc920ff6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed578c0d28c3baed55f0496b94da503283db73ea4ef28c8b6502f7f0dc920ff6.exe
Resource
win10v2004-20220901-en
General
-
Target
ed578c0d28c3baed55f0496b94da503283db73ea4ef28c8b6502f7f0dc920ff6
-
Size
100KB
-
MD5
7006e9eb5e23ae58d97c54297af56335
-
SHA1
a89ad799725953459f4f81b21d3b573a1ae7510a
-
SHA256
ed578c0d28c3baed55f0496b94da503283db73ea4ef28c8b6502f7f0dc920ff6
-
SHA512
dd68f39cdbc5b28acb6f44224bde970656ff41e84969a6364ea0594ad621c486ea9cd34133d32037a9847055a30d830f2c01b72e59fc322dccf9ea70173f6dd3
-
SSDEEP
1536:u1hIkaawOXT8rXlyOy5EaXZZbPsmJdlTIFqgOZZyJ6zLvQZNyCXcDY7:mSzOXT8r105JZzFvTLgOw6zLaNwI
Malware Config
Signatures
Files
-
ed578c0d28c3baed55f0496b94da503283db73ea4ef28c8b6502f7f0dc920ff6.exe windows x86
55a6d3522c8986f6d07b828a21e4c86d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc80
ord6276
ord3801
ord6278
ord4014
ord4038
ord757
ord605
ord657
ord2020
ord304
ord578
ord911
ord784
ord310
ord1482
ord1084
ord2368
ord876
ord2902
ord2367
ord572
ord3229
ord4486
ord2991
ord2862
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4326
ord4722
ord3403
ord5214
ord4185
ord6275
ord5073
ord1908
ord5152
ord4237
ord1402
ord3946
ord1617
ord1620
ord5915
ord6725
ord1570
ord2091
ord4099
ord1484
ord1933
ord6266
ord1397
ord1063
ord354
ord3182
ord4262
ord5203
ord4244
ord1401
ord5912
ord6724
ord1551
ord1670
ord1671
ord4890
ord4212
ord5182
ord1794
ord3406
ord907
ord3641
ord4749
ord4735
ord2168
ord4580
ord1489
ord6118
ord299
ord6703
ord631
ord1440
ord2468
ord1486
ord2751
ord2748
ord3931
ord2288
ord2280
ord386
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord4541
ord3683
ord4282
ord764
ord1207
msvcr80
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
__CxxFrameHandler3
memset
_splitpath
__argv
_setmbcp
__argc
_controlfp_s
kernel32
Sleep
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedExchange
GetStartupInfoA
CopyFileA
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
lstrcmpiA
user32
LoadIconA
EnableWindow
ReleaseDC
GetDC
SendMessageA
gdi32
GetTextExtentPoint32A
GetTextMetricsA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE