Static task
static1
Behavioral task
behavioral1
Sample
411898deb4a83efb7f0612d31a8bb1d40d4aae13f13b11ad634ee6bea1005b9a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
411898deb4a83efb7f0612d31a8bb1d40d4aae13f13b11ad634ee6bea1005b9a.exe
Resource
win10v2004-20220812-en
General
-
Target
411898deb4a83efb7f0612d31a8bb1d40d4aae13f13b11ad634ee6bea1005b9a
-
Size
320KB
-
MD5
a213a0bb93ad06ca43b30c6b0ad707b0
-
SHA1
bfd2414233ca399b2dfa16a5c57fc7db3fccba92
-
SHA256
411898deb4a83efb7f0612d31a8bb1d40d4aae13f13b11ad634ee6bea1005b9a
-
SHA512
1f33c192ffc4c9f5ca77d5c0da6ab21ec141431cf2a43d7730cc35993b6d7bbb6c53aae068d3088ab73f8b2b3981aef8349bab8dac767c389f4c268ff4a8bed7
-
SSDEEP
6144:RUj6ulyklsH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:VulyM62EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
411898deb4a83efb7f0612d31a8bb1d40d4aae13f13b11ad634ee6bea1005b9a.exe windows x86
1c13c13d6bb53a6e39d6d7702269bd6d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadIOPendingFlag
EnumDateFormatsW
GetLogicalDrives
RegisterConsoleOS2
CreateThread
LocalLock
GetStringTypeW
GetSystemTimeAsFileTime
SetCalendarInfoW
CreateSemaphoreW
ResetWriteWatch
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE