Static task
static1
Behavioral task
behavioral1
Sample
2f994b182d2645ded84cc125263e3d714f8cb4c837137a302a00562b1320c66a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2f994b182d2645ded84cc125263e3d714f8cb4c837137a302a00562b1320c66a.exe
Resource
win10v2004-20220901-en
General
-
Target
2f994b182d2645ded84cc125263e3d714f8cb4c837137a302a00562b1320c66a
-
Size
63KB
-
MD5
441a9c32a527fb15a1142c8d2cb65a70
-
SHA1
1e3d48313526bdd5b88f58157d1841e6e40f923c
-
SHA256
2f994b182d2645ded84cc125263e3d714f8cb4c837137a302a00562b1320c66a
-
SHA512
6dbfa0cb41a0679d4f88e7efeb89a486cf39260e361550cd844d23c31855b60f2413e0885e02206a5b518685b437730a365baf9d72e53152887a6b1a0b8f4e5f
-
SSDEEP
1536:Wjodom85Or7mZGG8YThXUknoK0ejLPlYCgvGnGQ:WjUvzPWGG80hpnXxjLPSCGGnn
Malware Config
Signatures
Files
-
2f994b182d2645ded84cc125263e3d714f8cb4c837137a302a00562b1320c66a.exe windows x86
ba8008c2135fcf172ad108a6224533cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessTimes
GetCurrentActCtx
CreateConsoleScreenBuffer
EnumSystemLocalesW
CallNamedPipeA
GetProcessVersion
GetTempPathW
lstrcpyA
NumaVirtualQueryNode
CreateActCtxW
CopyFileA
lstrcatW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 49KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE