Static task
static1
Behavioral task
behavioral1
Sample
98501cbd958269db0fddc36576e4946f52250b7a35a3338bc230c08e786380dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98501cbd958269db0fddc36576e4946f52250b7a35a3338bc230c08e786380dd.exe
Resource
win10v2004-20220812-en
General
-
Target
98501cbd958269db0fddc36576e4946f52250b7a35a3338bc230c08e786380dd
-
Size
23KB
-
MD5
90964d36f0e17268c717d934c12c0200
-
SHA1
804af7dd46d5a395fd548c42f819ad08a0cd9e2a
-
SHA256
98501cbd958269db0fddc36576e4946f52250b7a35a3338bc230c08e786380dd
-
SHA512
a5dc641eefe2d18d53b64b88f0b90fe078f4093a4390d6d421a3ec7de717fe9cb0af19a5cb2cb3628d178a714e038e8a292e5746bd67073a115bfe6bfc7212e0
-
SSDEEP
384:V88hYS1Ta1mMVCOrgKS/nJqXrQSz1is1lG4nfHH5hTs:V3k1mMV7F68XrQs18oHZ
Malware Config
Signatures
Files
-
98501cbd958269db0fddc36576e4946f52250b7a35a3338bc230c08e786380dd.exe windows x86
714beef5c10e5bdd5ecf905a3f470f76
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
FlushFileBuffers
GetTempPathA
GetDiskFreeSpaceExA
VirtualAlloc
SetUnhandledExceptionFilter
GetSystemWindowsDirectoryA
GetCommandLineA
GetDiskFreeSpaceA
VirtualLock
IsBadWritePtr
GetVolumeInformationA
CreateNamedPipeA
GetPriorityClass
ReleaseSemaphore
GetLastError
GetCPInfoExA
GetPrivateProfileStringA
RtlMoveMemory
SetLastConsoleEventActive
GlobalHandle
IsWow64Process
PurgeComm
advapi32
CredMarshalCredentialW
CredFree
dpmodemx
SPInit
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE