Static task
static1
Behavioral task
behavioral1
Sample
1040149e3cb441942c2127efb00472197bbc0808926dc67a01fd695a5e573238.exe
Resource
win7-20220812-en
General
-
Target
1040149e3cb441942c2127efb00472197bbc0808926dc67a01fd695a5e573238
-
Size
120KB
-
MD5
2a7a36364aa189ab74490e826e5af70c
-
SHA1
c38a6a7a1a0cd431ce1263e87c0f21ff11cfffb5
-
SHA256
1040149e3cb441942c2127efb00472197bbc0808926dc67a01fd695a5e573238
-
SHA512
bf1c66af32d26bac864b035095c0bf5c3b29a062e626ade5e2845b21e0e0a10382a9d0e4c5c1ae57c016fa611cef7a328aceb6a3656950e9e57d6f36f86c16c5
-
SSDEEP
3072:+7aozfncelqJN/zrBrdYulppoym2EUTCXlQ:8bpO/zrEu3m7ZQ
Malware Config
Signatures
Files
-
1040149e3cb441942c2127efb00472197bbc0808926dc67a01fd695a5e573238.exe windows x86
cf9175c319205b677fbc3cf5c5098ece
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEnvironmentVariableA
GetStringTypeW
WaitForSingleObject
InterlockedDecrement
lstrcmpA
GetExitCodeProcess
GetPrivateProfileIntA
InterlockedIncrement
GetPrivateProfileSectionA
GetLogicalDrives
HeapCreate
Heap32First
GetLongPathNameA
lstrcpyW
GetCurrentDirectoryA
GetModuleHandleW
GetPrivateProfileIntA
GetDiskFreeSpaceW
LoadLibraryA
GetDiskFreeSpaceW
FindResourceW
Sleep
ReadFileEx
apphelp
ApphelpCheckIME
AllowPermLayer
ApphelpCheckExe
SdbCreateMsiTransformFile
clbcatq
ComPlusMigrate
ComPlusMigrate
SetSetupSave
DllGetClassObject
SetupOpen
SetSetupSave
CheckMemoryGates
CheckMemoryGates
ComPlusMigrate
DllGetClassObject
SetupOpen
SetupOpen
CheckMemoryGates
version
VerFindFileA
Sections
.text Size: 1024B - Virtual size: 896B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE