Static task
static1
Behavioral task
behavioral1
Sample
dfa310c329995894279915b00470fe9bfcfe17b611ad006be344a90a3d5ad393.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfa310c329995894279915b00470fe9bfcfe17b611ad006be344a90a3d5ad393.exe
Resource
win10v2004-20220812-en
General
-
Target
dfa310c329995894279915b00470fe9bfcfe17b611ad006be344a90a3d5ad393
-
Size
111KB
-
MD5
6a7cb509869cc0a78ad3c72ebec69093
-
SHA1
ef4aaf24f3c0925c5d0e474bfcdfc9b13844cc2c
-
SHA256
dfa310c329995894279915b00470fe9bfcfe17b611ad006be344a90a3d5ad393
-
SHA512
0975bc1de12076ab10dae467bdd3aac1b2f9bcab21a67235cdddd5100bb96acb16f266d93d54b6aff787d33612d53306f4df10b8980cb9c5ded2e73f4d442c0e
-
SSDEEP
1536:yHzpDX2V5E982ivQpnGkxRO3BE9tIkmtG+Tvd1e0MFSMapNsrDYum6Qs3AS3d3Kc:6zpDXm5BLCnGkgZ9G+LdkNia82So
Malware Config
Signatures
Files
-
dfa310c329995894279915b00470fe9bfcfe17b611ad006be344a90a3d5ad393.exe windows x86
5aa533352049e0dfe165254020519fc4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__getmainargs
_except_handler3
__p___initenv
__set_app_type
_XcptFilter
_adjust_fdiv
_controlfp
__p__commode
__p__fmode
__setusermatherr
calloc
_exit
free
_initterm
kernel32
GetProcessHeap
lstrcatA
FileTimeToLocalFileTime
CompareStringW
GetLocalTime
GetCurrentProcess
GetProcAddress
GetFileAttributesW
FlushFileBuffers
GetCommandLineW
VirtualProtectEx
SetUnhandledExceptionFilter
GetVersionExW
ExpandEnvironmentStringsA
DeleteFileA
GetModuleHandleW
DeviceIoControl
SetThreadLocale
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ