Static task
static1
Behavioral task
behavioral1
Sample
474586ecbdefebb0a09d6ba9f5aad4d116e88e42ece1c7c4b049bd7ca9d21c45.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
474586ecbdefebb0a09d6ba9f5aad4d116e88e42ece1c7c4b049bd7ca9d21c45.exe
Resource
win10v2004-20220812-en
General
-
Target
474586ecbdefebb0a09d6ba9f5aad4d116e88e42ece1c7c4b049bd7ca9d21c45
-
Size
295KB
-
MD5
2704c7fac04a300d0bf13119d903acd0
-
SHA1
47c0f8d471ad64091ba7a7660f83bd25ca7bcf37
-
SHA256
474586ecbdefebb0a09d6ba9f5aad4d116e88e42ece1c7c4b049bd7ca9d21c45
-
SHA512
ecbf36b6801415b16a34d77c7a2d5f5b46ea8ab142d4d7c697a22444e79e605441a97ab5bcbe985e888cb6242d7a03f0f84caa7bb728cc5b43262163c3c52a33
-
SSDEEP
6144:NU34MdmLkNdxNjakKK6eSdc5S4M9IQTcGFuRxwHaARk5tVzb/:TMdfd/jF8a569b3KtVzb
Malware Config
Signatures
Files
-
474586ecbdefebb0a09d6ba9f5aad4d116e88e42ece1c7c4b049bd7ca9d21c45.exe windows x86
8111b660ed0eff9fe11103fb58934aad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
SetUnhandledExceptionFilter
MultiByteToWideChar
CreateFileA
GetCurrentProcessId
GetSystemDefaultLangID
GetUserDefaultLCID
CloseHandle
SystemTimeToFileTime
GetOEMCP
lstrcmpA
GetLocalTime
GetCurrentProcess
WideCharToMultiByte
GetTickCount
HeapAlloc
HeapFree
lstrcpyW
QueryPerformanceCounter
SetLastError
GetSystemTimeAsFileTime
GetProcessHeap
w32topl
ToplScheduleExportReadonly
ToplScheduleCreate
ToplScheduleCacheCreate
ToplSTHeapInit
ToplScheduleCacheDestroy
ToplSTHeapDestroy
ToplScheduleDuration
ToplSTHeapExtractMin
fmifs
Format
FormatEx
Extend
Chkdsk
EnableVolumeCompression
DiskCopy
Sections
.text Size: 129KB - Virtual size: 336KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iata Size: 159KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ