Static task
static1
Behavioral task
behavioral1
Sample
944dd6964dcc47279cf355ad1492f402b26ef9baf19e9a590855b6c06a62e833.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
944dd6964dcc47279cf355ad1492f402b26ef9baf19e9a590855b6c06a62e833.exe
Resource
win10v2004-20220812-en
General
-
Target
944dd6964dcc47279cf355ad1492f402b26ef9baf19e9a590855b6c06a62e833
-
Size
280KB
-
MD5
9188dc8a350c5bd2a0b42659122e75a4
-
SHA1
a197d1c35da59b4d3769a1ea3e6ea2ce3648fc11
-
SHA256
944dd6964dcc47279cf355ad1492f402b26ef9baf19e9a590855b6c06a62e833
-
SHA512
2d2143f9037d32ac988f263bca26534400abee537dedd070ce688052ce8466690a8358129bc992d1ffe21f99ebabb35b4c0461425f93abbbe8dddf47f8f2507d
-
SSDEEP
6144:nXKbwzkHZNSEiqay+qjiiutshpHoiptSBLpgp:aUY5+VioZBw
Malware Config
Signatures
Files
-
944dd6964dcc47279cf355ad1492f402b26ef9baf19e9a590855b6c06a62e833.exe windows x86
1d0d0903d16a2e97ef023a493b153209
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
SetLastError
QueryPerformanceCounter
GetSystemTimeAsFileTime
FindResourceW
GetCurrentProcessId
HeapAlloc
GetLocalTime
GetProcessHeap
MultiByteToWideChar
HeapFree
lstrcmpA
SystemTimeToFileTime
GetTickCount
WideCharToMultiByte
LoadLibraryA
CreateFileA
GetCurrentProcess
lstrcpyW
lstrlenW
CloseHandle
GetLocaleInfoW
SetUnhandledExceptionFilter
fmifs
Extend
EnableVolumeCompression
FormatEx
DiskCopy
Format
ComputeFmMediaType
Chkdsk
w32topl
ToplScheduleCreate
ToplSTHeapInit
ToplScheduleExportReadonly
ToplScheduleCacheDestroy
ToplScheduleDuration
ToplSTHeapExtractMin
ToplSTHeapDestroy
ToplScheduleCacheCreate
Sections
.text Size: 270KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ