Static task
static1
Behavioral task
behavioral1
Sample
0ef3f1c3383d58dcb43e8088473a2bff9de9708a6de92462813f9e25fea5402b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ef3f1c3383d58dcb43e8088473a2bff9de9708a6de92462813f9e25fea5402b.exe
Resource
win10v2004-20220812-en
General
-
Target
0ef3f1c3383d58dcb43e8088473a2bff9de9708a6de92462813f9e25fea5402b
-
Size
82KB
-
MD5
914b428c69fef52d1fddb7bb89e7b6d0
-
SHA1
989d17e4e278a76c393f9a56870e00f773024cd4
-
SHA256
0ef3f1c3383d58dcb43e8088473a2bff9de9708a6de92462813f9e25fea5402b
-
SHA512
3f821f3ee96e8e4706eaa037198f0e842edfbf443b8d7ea1b4f7d24658e53ccfdda22ec2e3a6373b720fb9288c62877a49de5e38e054abb8c8507ae1b2de1685
-
SSDEEP
1536:Tc4o9vh/OiMdyLMbdFyJCB1RRAdKEoeRV+HsDxD4ghVmKgVBqVKV:E956jh+KIIqF4ghVmXB/
Malware Config
Signatures
Files
-
0ef3f1c3383d58dcb43e8088473a2bff9de9708a6de92462813f9e25fea5402b.exe windows x86
396bd05195e4b538dad8737054d2483e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessA
GetModuleHandleW
VirtualProtect
lstrlenA
GetACP
SizeofResource
MoveFileA
GlobalLock
GetLocaleInfoW
RaiseException
GetTempPathA
lstrcmpiW
GetDiskFreeSpaceA
GetCurrentDirectoryA
GetShortPathNameA
GetThreadLocale
GetModuleHandleA
GetFullPathNameA
UnhandledExceptionFilter
QueryPerformanceCounter
IsDebuggerPresent
DeleteFileA
LoadResource
GetEnvironmentStringsW
CompareStringA
FlushFileBuffers
GetExitCodeProcess
InterlockedIncrement
msvcrt
__getmainargs
_XcptFilter
__p__commode
__set_app_type
_initterm
__p__fmode
_controlfp
_except_handler3
_adjust_fdiv
__setusermatherr
_exit
__p___initenv
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ