Static task
static1
Behavioral task
behavioral1
Sample
7bd60501b867e3f657bad57e5a945f4ee9cc3027c9ad8d6c4f0f02076f5770c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7bd60501b867e3f657bad57e5a945f4ee9cc3027c9ad8d6c4f0f02076f5770c7.exe
Resource
win10v2004-20220812-en
General
-
Target
7bd60501b867e3f657bad57e5a945f4ee9cc3027c9ad8d6c4f0f02076f5770c7
-
Size
586KB
-
MD5
51dcb32d187e4f1f1b709bf1ff69e750
-
SHA1
f3de984d398b436b67a01913d93493aad45ba5c7
-
SHA256
7bd60501b867e3f657bad57e5a945f4ee9cc3027c9ad8d6c4f0f02076f5770c7
-
SHA512
12e18e73c26eb4dba1748099fee41d4083cd0cc1265920b8500ca620014156a2cfa521ef280e40464cd07a1b14da052189b2fb5dd9d4a16a4aa7a253a72e74fd
-
SSDEEP
12288:2r5xS/NQqStF//0Nl6itkqp8/V4BUxrbI5RiYb/Qcow:Ki+xn8l1kqp8/V42xrkRieow
Malware Config
Signatures
Files
-
7bd60501b867e3f657bad57e5a945f4ee9cc3027c9ad8d6c4f0f02076f5770c7.exe windows x86
fb9247e30c2605c3b5cecdb8d5eef505
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetProcAddress
LoadLibraryW
LoadLibraryA
GetLastError
LocalAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
RtlUnwind
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
RaiseException
msvcrt
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 552KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE