Static task
static1
Behavioral task
behavioral1
Sample
4eedafc5c517e07391961b53ad5aeb9f9bdf2fe2537157e336058e52be101017.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4eedafc5c517e07391961b53ad5aeb9f9bdf2fe2537157e336058e52be101017.exe
Resource
win10v2004-20220812-en
General
-
Target
4eedafc5c517e07391961b53ad5aeb9f9bdf2fe2537157e336058e52be101017
-
Size
275KB
-
MD5
09f1f92bbd68aa6a3d43e97d4c8d5f80
-
SHA1
10db613c36589b92f273447bf6a1afa8bfb0c26f
-
SHA256
4eedafc5c517e07391961b53ad5aeb9f9bdf2fe2537157e336058e52be101017
-
SHA512
1dc422ee099c9f458a2ea38c19b2c57ed10ff7f8aa4b812984fce1d9b4199c611701f97d76920297f5f274f88c24eb32a2446aac7c5b4a9d7e0cdc8ba609eb8d
-
SSDEEP
6144:NFC83I2aUcPJkA931gGvgdTmyvxRM1QMuwraBD:TP42aV19lgGvgdRRKQMuOy
Malware Config
Signatures
Files
-
4eedafc5c517e07391961b53ad5aeb9f9bdf2fe2537157e336058e52be101017.exe windows x86
9c5ee4b3b35e221c65ee5bec1bc87ad5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetTickCount
SetLastError
HeapAlloc
lstrcpyW
lstrcmpA
SystemTimeToFileTime
MultiByteToWideChar
GetCurrentProcess
QueryPerformanceCounter
LoadLibraryA
GetProcessHeap
GetLocalTime
IsValidLocale
CreateFileA
HeapFree
GetUserDefaultLCID
SetUnhandledExceptionFilter
WideCharToMultiByte
GetSystemTimeAsFileTime
CloseHandle
GetSystemDefaultLangID
w32topl
ToplSTHeapDestroy
ToplScheduleDuration
ToplScheduleExportReadonly
ToplScheduleCreate
ToplScheduleCacheDestroy
ToplSTHeapExtractMin
ToplScheduleCacheCreate
ToplSTHeapInit
fmifs
Extend
FormatEx
DiskCopy
EnableVolumeCompression
Format
Chkdsk
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 244KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ