Static task
static1
Behavioral task
behavioral1
Sample
3fff92a7a4ba47ed8a16853aba926cf46de33c424382cf72ba564fc9e7f0a549.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3fff92a7a4ba47ed8a16853aba926cf46de33c424382cf72ba564fc9e7f0a549.exe
Resource
win10v2004-20220812-en
General
-
Target
3fff92a7a4ba47ed8a16853aba926cf46de33c424382cf72ba564fc9e7f0a549
-
Size
137KB
-
MD5
6c69075cc5f49e56a9cc899d189ce399
-
SHA1
75b88b1760499bb6b89f1b99a5c6110f433d81dd
-
SHA256
3fff92a7a4ba47ed8a16853aba926cf46de33c424382cf72ba564fc9e7f0a549
-
SHA512
0667d9b3b6d4e4b738904df858a4fa173886a1866af2836abe1ac49bcb1ab7008d05921c2bdb15dfa4ce43a5fda2f6e912ef6388467ebff6268ab875aee4b761
-
SSDEEP
3072:xHhip4H1BrbUCDhIrQYowjHu89n1dWaF/P2qLuJ:viI1JgCDa8YowjH1XFDg
Malware Config
Signatures
Files
-
3fff92a7a4ba47ed8a16853aba926cf46de33c424382cf72ba564fc9e7f0a549.exe windows x86
51c926d8e0036446cc001cbe9fb4d801
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetCommandLineW
GetLocalTime
lstrcmpiW
VirtualQuery
GetThreadLocale
FlushFileBuffers
GetProcAddress
IsBadCodePtr
VirtualAlloc
GetProcessHeap
InterlockedExchange
VirtualProtectEx
IsValidCodePage
GlobalLock
msvcrt
__set_app_type
_initterm
__getmainargs
calloc
_XcptFilter
__p___initenv
_adjust_fdiv
_exit
__p__commode
_except_handler3
_controlfp
free
__setusermatherr
__p__fmode
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE