Static task
static1
Behavioral task
behavioral1
Sample
47c0f5d563b298007a25a79ec5ceb56faed352a851048038c9345344e65c2e6c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47c0f5d563b298007a25a79ec5ceb56faed352a851048038c9345344e65c2e6c.exe
Resource
win10v2004-20220812-en
General
-
Target
47c0f5d563b298007a25a79ec5ceb56faed352a851048038c9345344e65c2e6c
-
Size
279KB
-
MD5
7c2c345991ff8e6fe0639e7f3f60f6e0
-
SHA1
ba51f6288571a819b7c363f2b323125c0ad348f0
-
SHA256
47c0f5d563b298007a25a79ec5ceb56faed352a851048038c9345344e65c2e6c
-
SHA512
8ce3e99e7927a2f9327b223e125c52617974c92574ba3763be1ca28efa7b142a91d2796c11fd9c196827faeb1c48c85b50e1c6c18af53aec5a40dbeb235cc410
-
SSDEEP
6144:cwQ+RuUvy+pDlahOnlk9anvyujKG/rCcSzY9Hv9JDhGaMIVF:cwQIpRa+U89KArsY9P93GyVF
Malware Config
Signatures
Files
-
47c0f5d563b298007a25a79ec5ceb56faed352a851048038c9345344e65c2e6c.exe windows x86
b4373bd05672eb1507bc62132c64c254
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
w32topl
ToplScheduleDuration
ToplSTHeapInit
ToplSTHeapExtractMin
ToplScheduleCreate
ToplSTHeapDestroy
ToplScheduleExportReadonly
ToplScheduleCacheCreate
ToplScheduleCacheDestroy
kernel32
SetLastError
FindResourceW
lstrlenW
GetLocaleInfoW
HeapFree
GetOEMCP
SystemTimeToFileTime
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcess
WideCharToMultiByte
GetLocalTime
lstrcmpA
HeapAlloc
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
CloseHandle
GetProcessHeap
lstrcpyW
GetUserDefaultLCID
GlobalFindAtomA
CreateFileA
MultiByteToWideChar
fmifs
EnableVolumeCompression
Extend
DiskCopy
Format
FormatEx
Chkdsk
ComputeFmMediaType
Sections
.text Size: 273KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ