Static task
static1
Behavioral task
behavioral1
Sample
38f41119af3a5228e4ec8068a3e90868216c05d88f22f64de65bdbbd8bf031ed.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
38f41119af3a5228e4ec8068a3e90868216c05d88f22f64de65bdbbd8bf031ed.exe
Resource
win10v2004-20220901-en
General
-
Target
38f41119af3a5228e4ec8068a3e90868216c05d88f22f64de65bdbbd8bf031ed
-
Size
275KB
-
MD5
63c4e4d934db103d063d6351687631a0
-
SHA1
9c99ea40750246c7e2ecf8d00eb7943f0ff2af21
-
SHA256
38f41119af3a5228e4ec8068a3e90868216c05d88f22f64de65bdbbd8bf031ed
-
SHA512
c07368cf6ca6fc20aeaf83997b09039b35d6c04435d9ea5632e72f568eb3485bba146d179a050dece3510b700fcb8cce07b227c76f0cf66143d1893c2d2fc9b3
-
SSDEEP
6144:NFC83I2aUcPJkA931gGvgdTmyvxRM1QMuwraBz:TP42aV19lgGvgdRRKQMuOW
Malware Config
Signatures
Files
-
38f41119af3a5228e4ec8068a3e90868216c05d88f22f64de65bdbbd8bf031ed.exe windows x86
9c5ee4b3b35e221c65ee5bec1bc87ad5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetTickCount
SetLastError
HeapAlloc
lstrcpyW
lstrcmpA
SystemTimeToFileTime
MultiByteToWideChar
GetCurrentProcess
QueryPerformanceCounter
LoadLibraryA
GetProcessHeap
GetLocalTime
IsValidLocale
CreateFileA
HeapFree
GetUserDefaultLCID
SetUnhandledExceptionFilter
WideCharToMultiByte
GetSystemTimeAsFileTime
CloseHandle
GetSystemDefaultLangID
w32topl
ToplSTHeapDestroy
ToplScheduleDuration
ToplScheduleExportReadonly
ToplScheduleCreate
ToplScheduleCacheDestroy
ToplSTHeapExtractMin
ToplScheduleCacheCreate
ToplSTHeapInit
fmifs
Extend
FormatEx
DiskCopy
EnableVolumeCompression
Format
Chkdsk
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 244KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ