Static task
static1
Behavioral task
behavioral1
Sample
e79274c2dd9a392488f4ffd9bb2ebdfabe339bf07b038174d5afd983b32f121f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e79274c2dd9a392488f4ffd9bb2ebdfabe339bf07b038174d5afd983b32f121f.exe
Resource
win10v2004-20220812-en
General
-
Target
e79274c2dd9a392488f4ffd9bb2ebdfabe339bf07b038174d5afd983b32f121f
-
Size
112KB
-
MD5
2405c90bf59487fe91e670c77c29e710
-
SHA1
a1bad83456a9b35887439105c9df9b8446d3ab19
-
SHA256
e79274c2dd9a392488f4ffd9bb2ebdfabe339bf07b038174d5afd983b32f121f
-
SHA512
472ade7c8fdbdcd3c6caa7603440383216dc89c17b23b8eb808772b7272512eb466af4937e5321d774304190a13adac26b7878eebff1eb30195efe82e538b579
-
SSDEEP
3072:/CewnVS570M9kdatGCO+xmBc+hMPhPsx8WyTt:6Vs7nyatGt+SYFBWyTt
Malware Config
Signatures
Files
-
e79274c2dd9a392488f4ffd9bb2ebdfabe339bf07b038174d5afd983b32f121f.exe windows x86
bc32799326f9fa0b2a679c7cdcdd0f41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
HeapSetInformation
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetProcessHeap
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
GetCurrentThreadId
GetCommandLineW
UnhandledExceptionFilter
msvcrt
_controlfp
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
shell32
CommandLineToArgvW
fverecover
FveRecoverWizard
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE