Static task
static1
Behavioral task
behavioral1
Sample
96584adcd94025476dab47501d95988a6becd42f776278b1ec314709f24cf3d3.exe
Resource
win7-20220901-en
General
-
Target
96584adcd94025476dab47501d95988a6becd42f776278b1ec314709f24cf3d3
-
Size
222KB
-
MD5
6c0c9b1a9e50d92edf1291e4c4b0ab90
-
SHA1
dd7b0d866335114f1b59fc38e3727ac9c328a8c5
-
SHA256
96584adcd94025476dab47501d95988a6becd42f776278b1ec314709f24cf3d3
-
SHA512
de9a780b4fed61516fae31fce6f45d72efacc93b3e7a98640d1f019f3dacbe766f103daf9344130052916657719b9e71e4b357b1ef05fa34ccb8854ebe73f128
-
SSDEEP
6144:0e64djPZvNQeP8VvrkuPjc/K+X5VSkiquPhXC4n:lzeeP6JA/ckiqW/
Malware Config
Signatures
Files
-
96584adcd94025476dab47501d95988a6becd42f776278b1ec314709f24cf3d3.exe windows x86
b3557dffa6d810f6a9d28e0300f50338
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetExitCodeProcess
GetDriveTypeA
GetSystemDirectoryA
GetCurrentDirectoryA
CloseHandle
GetDiskFreeSpaceA
WaitForSingleObject
CreateEventA
GetFileAttributesA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
CreateFileA
SetFileTime
CreateThread
LocalFileTimeToFileTime
CreateDirectoryA
HeapAlloc
HeapFree
SetFilePointer
ReadFile
WriteFile
ExitProcess
GetLastError
RemoveDirectoryA
DeleteFileA
TerminateProcess
SetEvent
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
DosDateTimeToFileTime
FormatMessageA
user32
EndDialog
SendDlgItemMessageA
LoadStringA
DialogBoxParamA
ShowWindow
SendMessageA
MessageBoxA
comctl32
ord17
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ntdll
strstr
_allmul
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zero Size: - Virtual size: 66KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 197KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE