Static task
static1
Behavioral task
behavioral1
Sample
d8815d9f3bec80210721a4e36cd6576fa906d51df8475f021c7dfc4bd1b1aa57.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8815d9f3bec80210721a4e36cd6576fa906d51df8475f021c7dfc4bd1b1aa57.exe
Resource
win10v2004-20220812-en
General
-
Target
d8815d9f3bec80210721a4e36cd6576fa906d51df8475f021c7dfc4bd1b1aa57
-
Size
212KB
-
MD5
a17c5710ce69d2d002dd7fe90e8a0e07
-
SHA1
295fe7e25824eaab8495ae38334c56e6e6041239
-
SHA256
d8815d9f3bec80210721a4e36cd6576fa906d51df8475f021c7dfc4bd1b1aa57
-
SHA512
d69127f998cf526d80b7c16a7447a6e2ef8af8cba6a0b41b092e483aa4abb92a088a9e0452e394f0781f4d4505b7e5d2921b2fb9a77b7583c860df84e9f86cc4
-
SSDEEP
6144:/OHVW5KxZYt5iXVAdvKkaz2RNZSq94mp7:mHgAxa5iFREHZSwp
Malware Config
Signatures
Files
-
d8815d9f3bec80210721a4e36cd6576fa906d51df8475f021c7dfc4bd1b1aa57.exe windows x86
c86dd7404d4674e8495ceb634eea680b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextVolumeA
SetFilePointer
TerminateProcess
Thread32First
OpenSemaphoreA
GetConsoleCP
Heap32First
GetUserDefaultUILanguage
CommConfigDialogA
ReadConsoleInputA
GetCurrentProcess
Heap32ListFirst
HeapFree
VirtualAlloc
SetSystemTimeAdjustment
HeapUnlock
GetProcessIoCounters
HeapAlloc
EnumResourceLanguagesA
EnumSystemLanguageGroupsA
GlobalUnWire
GetCommandLineW
GetProcessShutdownParameters
SearchPathA
GetFileTime
LocalShrink
EnumSystemCodePagesA
GetComputerNameA
HeapSize
SetProcessPriorityBoost
PeekConsoleInputA
GetProcessHandleCount
GetLocaleInfoA
TermsrvAppInstallMode
InterlockedExchange
ws2_32
recv
Sections
.itext Size: - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 168KB - Virtual size: 833KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ