Static task
static1
Behavioral task
behavioral1
Sample
94c37001402625662799f019e0c6327d676fe297e480643141efc07aabe3aaf3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
94c37001402625662799f019e0c6327d676fe297e480643141efc07aabe3aaf3.exe
Resource
win10v2004-20220812-en
General
-
Target
94c37001402625662799f019e0c6327d676fe297e480643141efc07aabe3aaf3
-
Size
299KB
-
MD5
63717b372023263521be99ffc757f310
-
SHA1
5d9e564a7d428fec090f2b54f99cb1705bda6f9d
-
SHA256
94c37001402625662799f019e0c6327d676fe297e480643141efc07aabe3aaf3
-
SHA512
e1c93682dd8b7767fecd60fd34c7b31f33a4da9fd9a54a5aa7b9f71af7217969bc7e858df7efe836c1a295c2506d76ccf0a83da580a3539438694f0ed25a5d05
-
SSDEEP
6144:JzuRAShBVTWJLUp3Xge80kPEpmJGTSaFVwUsgIgKlcOYHYXEw:JkjhBVTWJLcgmmGv9sgYlQH3
Malware Config
Signatures
Files
-
94c37001402625662799f019e0c6327d676fe297e480643141efc07aabe3aaf3.exe windows x86
546f5ace910923863971ec57c462b932
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
GetModuleHandleA
CreateMailslotA
lstrcmpiA
HeapCreate
CreateNamedPipeA
GetProcessHeap
SuspendThread
lstrcmpiA
GetVolumePathNameA
Sleep
WaitForSingleObject
SetLastError
lstrlenA
FileTimeToLocalFileTime
GetDriveTypeW
IsValidLocale
lstrcmpiA
DeleteFileA
GetLogicalDriveStringsA
lstrcmpiA
GetStdHandle
GetModuleFileNameA
riched20
IID_ITextHost
IID_IRichEditOle
CreateTextServices
RichEditANSIWndProc
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 290KB - Virtual size: 289KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.srt Size: 1024B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ