Static task
static1
Behavioral task
behavioral1
Sample
ac771da413f2969fdd4ef106d6b3657d7e8678a3e53d8f2c7c94f92f80ea2e18.exe
Resource
win7-20220812-en
General
-
Target
ac771da413f2969fdd4ef106d6b3657d7e8678a3e53d8f2c7c94f92f80ea2e18
-
Size
2.0MB
-
MD5
959486b082d872cab0804cfcc9df8100
-
SHA1
5e5b65051d9f9d17fd7a3d4028c376a9219bfe90
-
SHA256
ac771da413f2969fdd4ef106d6b3657d7e8678a3e53d8f2c7c94f92f80ea2e18
-
SHA512
f5b054e6953c6cc3116d9c00e12f73bae8799e42b8676c840353351559b3fb62daa977ff590044a31884dabfb1c50eac74b0b6b9f51fc44e59942038bde8f9e7
-
SSDEEP
49152:dXBMMbMMRWU1bTChxKCnFnQXBbrtgb/iQvu0UHOa5u:jMMbMMl16hxvWbrtUTrUHOJ
Malware Config
Signatures
Files
-
ac771da413f2969fdd4ef106d6b3657d7e8678a3e53d8f2c7c94f92f80ea2e18.exe windows x86
730073214094cd328547bf1f72289752
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameW
DuplicateHandle
GetCurrentProcess
SetFileTime
CopyFileW
GetDriveTypeW
GetFileTime
CreateFileW
SetErrorMode
GetTempFileNameW
GetTempPathW
ExitProcess
Sleep
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
ReadProcessMemory
GetThreadSelectorEntry
GetThreadContext
GetLastError
lstrlenW
GetModuleHandleW
GetStartupInfoW
user32
MessageBoxA
shell32
ShellExecuteW
msvcrt
memset
wcscpy
free
_fileno
_chsize
wcsrchr
wcscat
malloc
fclose
fread
fwrite
fseek
_wfopen
sprintf
fflush
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE