Static task
static1
Behavioral task
behavioral1
Sample
699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a.exe
Resource
win10v2004-20220812-en
General
-
Target
699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a
-
Size
829KB
-
MD5
52c100e5600bcd0176de1d89e52f6af0
-
SHA1
bdebd0e131633e4d7d51503b800100433257860e
-
SHA256
699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a
-
SHA512
d58f316ac9550aa492a459ccb567ac43b0bfb7577d05bd36d24cb220f68349600a9f449c19b4a993cfa3a8298e9d03dd50cab9a461b539c79770f4c70fc92aff
-
SSDEEP
24576:+kLdGAW13n/NxXb+5WUZQbzRpZkmqwGbA:+kLdZ4FxL+5M97kIG
Malware Config
Signatures
Files
-
699268e5506732baa32fc4ee865cd81b0a385a103decfc4c0fcb36066dedfa8a.exe windows x86
6e1fde56600c6e90464910cbd866e6f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
CreateSemaphoreW
GetNumberFormatW
GetAtomNameA
GetDiskFreeSpaceA
GetModuleHandleA
ResetEvent
EnumCalendarInfoA
FindNextFileA
ReadConsoleW
GetCurrentThread
VirtualAlloc
GetVersion
LeaveCriticalSection
GetLocaleInfoA
MoveFileW
FindFirstFileW
dinput8
DirectInput8Create
DllCanUnloadNow
DllGetClassObject
DllUnregisterServer
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_WRITE
.EDATA Size: 813KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ