Static task
static1
Behavioral task
behavioral1
Sample
55321d1d21ecfc406a9fd9af6ed8f5db34d672024fc15012522e618eb8a59bc5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
55321d1d21ecfc406a9fd9af6ed8f5db34d672024fc15012522e618eb8a59bc5.exe
Resource
win10v2004-20220812-en
General
-
Target
55321d1d21ecfc406a9fd9af6ed8f5db34d672024fc15012522e618eb8a59bc5
-
Size
2.9MB
-
MD5
a0a4a9b2496f930be98fb39e3b96ba13
-
SHA1
660effb179d8fc4a1751f5bfcf9d2a8649be94ec
-
SHA256
55321d1d21ecfc406a9fd9af6ed8f5db34d672024fc15012522e618eb8a59bc5
-
SHA512
2de7e28dbfa68ec5a735873c856222a1cd383e21eb5d473fca0879359375732475bed07dc33922bb736365e189937d8df2eea0667c68c2c129d58ffe84a9d26e
-
SSDEEP
49152:wdrJvR71ms6xdFHoTuiGVwneCd91PcYyi0NFJz9tww/lapi9ufP4+6lGDRZ4n6es:wdrJDuG9eCYi0N9twKME9u3Og/4n6eNa
Malware Config
Signatures
Files
-
55321d1d21ecfc406a9fd9af6ed8f5db34d672024fc15012522e618eb8a59bc5.exe windows x86
e0392c139a5d21a4f308344b99c4aeb3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CancelWaitableTimer
OpenWaitableTimerA
GetProcessId
GetDefaultCommConfigA
FindResourceExW
GlobalDeleteAtom
WaitForMultipleObjectsEx
CopyFileExA
WaitNamedPipeA
ReadConsoleA
GetSystemWindowsDirectoryA
GetLogicalDrives
OpenThread
GlobalLock
VirtualAllocEx
GetCommMask
CreateThread
GetLocalTime
FindNextChangeNotification
WideCharToMultiByte
SetFileTime
GetPrivateProfileSectionA
GlobalDeleteAtom
QueryDosDeviceA
GetCommandLineA
SetConsoleHardwareState
QueryInformationJobObject
GetThreadLocale
GetConsoleAliasExesA
GetNumberOfConsoleInputEvents
GetComputerNameA
OutputDebugStringA
DuplicateHandle
SetFileValidData
IsDebuggerPresent
ExpandEnvironmentStringsA
AddAtomA
Sections
.text Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 20.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ