Static task
static1
Behavioral task
behavioral1
Sample
11fcb29f0b7ca7527faa6db91228275e3d21a7602c5886bccb7b69cde421eddd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11fcb29f0b7ca7527faa6db91228275e3d21a7602c5886bccb7b69cde421eddd.exe
Resource
win10v2004-20220901-en
General
-
Target
11fcb29f0b7ca7527faa6db91228275e3d21a7602c5886bccb7b69cde421eddd
-
Size
152KB
-
MD5
6f152b24f018ef0447d123f8941ea130
-
SHA1
cd7f5cb40b09b23188e189d01ebc14f385e5730d
-
SHA256
11fcb29f0b7ca7527faa6db91228275e3d21a7602c5886bccb7b69cde421eddd
-
SHA512
c02860270cc79282ac319f2ccf80c3fa1984aea1ce1b39f6b1f7857a1a1309c1a8237683fb1db106a6443e935e97216f0cc0eb0926c9e8a607ff6f8b530e931e
-
SSDEEP
3072:pbL5FpdRLIjRJd9DKx5z1216kWpm6kzx4+lO53EGDTNCoL9yyyyyyyyyyyyy:pbL5bIjRv9DSs8p3axBY53Pr
Malware Config
Signatures
Files
-
11fcb29f0b7ca7527faa6db91228275e3d21a7602c5886bccb7b69cde421eddd.exe windows x86
afb1ed92102b757e36567a4fe18527cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetProcAddress
LocalFree
RaiseException
LocalAlloc
GetModuleHandleA
RtlUnwind
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
Sections
Size: 72KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 18KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 35KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 6KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE