Static task
static1
Behavioral task
behavioral1
Sample
d07acf393f91e043b8500245ef58c0c128c184f71882fecd0825387a49e8389f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d07acf393f91e043b8500245ef58c0c128c184f71882fecd0825387a49e8389f.exe
Resource
win10v2004-20220812-en
General
-
Target
d07acf393f91e043b8500245ef58c0c128c184f71882fecd0825387a49e8389f
-
Size
320KB
-
MD5
90761f0a318636758fe29a065480fea0
-
SHA1
7c133fd3b9c807f3c3c59576aef17a995f526e2e
-
SHA256
d07acf393f91e043b8500245ef58c0c128c184f71882fecd0825387a49e8389f
-
SHA512
d1a0e5860955b61cb7f66d18e753a4bc4064b6f39f1fa425ee30da81aa3d2497312e7292f6e37cce6bcbc14130191c817a8511e994631ff907f3009513691efa
-
SSDEEP
6144:3DnpsiBkdH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:3Tze92EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
d07acf393f91e043b8500245ef58c0c128c184f71882fecd0825387a49e8389f.exe windows x86
c1ebb4807f7f42e7a211efb3d557d651
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateProcessInternalA
SetMailslotInfo
GetProcessWorkingSetSize
EnumCalendarInfoW
CreateVirtualBuffer
GetComputerNameW
SetConsoleInputExeNameA
DeleteCriticalSection
SetConsoleCtrlHandler
GetFirmwareEnvironmentVariableA
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE