Static task
static1
Behavioral task
behavioral1
Sample
803b5e55031488739fe191610af0eccb25481abcede0767907a0d6da7b223803.exe
Resource
win7-20220812-en
General
-
Target
803b5e55031488739fe191610af0eccb25481abcede0767907a0d6da7b223803
-
Size
286KB
-
MD5
4938e5e858df45db5f98f4096c4257bc
-
SHA1
e2044f820d54ccd3abd82458cedada1c5762c4a6
-
SHA256
803b5e55031488739fe191610af0eccb25481abcede0767907a0d6da7b223803
-
SHA512
1bf368e452269abbf0ff365300a4719f0e5eeeddc0bd554e30966274a18a4998b11fe31c7a956b0ad365b1987a7198cec790b00bcea5b0f28c7f7b32ac9fe941
-
SSDEEP
6144:oITthyk26QsBcG/7Spd6W9uPD9zC0UD+kmSR8EJND9pNs3:okthykb7UFE9zrUD98EnDZO
Malware Config
Signatures
Files
-
803b5e55031488739fe191610af0eccb25481abcede0767907a0d6da7b223803.exe windows x86
e185f6f7040ac2d6f376cb9aa55d5f11
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
FlushFileBuffers
GetCPInfo
GlobalFindAtomW
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStrings
VirtualProtect
LCMapStringW
SetStdHandle
GetOEMCP
LCMapStringA
FreeEnvironmentStringsW
GetThreadLocale
GetStringTypeW
ReadFile
EnumResourceNamesA
FreeEnvironmentStringsA
IsBadCodePtr
WideCharToMultiByte
FindFirstFileA
GetFullPathNameA
GetStringTypeExW
CreateFileA
GetEnvironmentStringsW
UnhandledExceptionFilter
SetFilePointer
GetStringTypeA
GetFileAttributesA
GetDiskFreeSpaceA
MulDiv
shlwapi
SHGetInverseCMAP
PathIsFileSpecA
SHCreateStreamOnFileEx
PathIsContentTypeA
PathAppendA
PathCreateFromUrlW
rpcrt4
RpcStringFreeA
Sections
.text Size: 145KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 138KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ