Static task
static1
Behavioral task
behavioral1
Sample
3194e68cf099bd764b0779806b495128cd107f43cb3126633b7f457799175a8e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3194e68cf099bd764b0779806b495128cd107f43cb3126633b7f457799175a8e.exe
Resource
win10v2004-20220812-en
General
-
Target
3194e68cf099bd764b0779806b495128cd107f43cb3126633b7f457799175a8e
-
Size
1014KB
-
MD5
80d81e37f2fd6ef8452f754afb2e8ce0
-
SHA1
144bf02cf1fd98c07594775984f86eceabbfcd87
-
SHA256
3194e68cf099bd764b0779806b495128cd107f43cb3126633b7f457799175a8e
-
SHA512
8d934c422c2f17f1f45003550cca6b52ed83d61cfe21bf05d9c76b5f3d53fd0287f12ff68c9766b0895109a4a2331019d7fc0b52e2bf50979597213f9bd92250
-
SSDEEP
24576:eV4g7Xmrz1+xeLgfSWFvBWkne36C6glV:64g7NZWCYzV
Malware Config
Signatures
Files
-
3194e68cf099bd764b0779806b495128cd107f43cb3126633b7f457799175a8e.exe windows x86
a88a2d726c2832390c278d96fc354c4f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
CreateFileMappingA
GetExitCodeThread
FreeEnvironmentStringsA
ReadFile
ExpandEnvironmentStringsA
HeapFree
UnmapViewOfFile
CreateNamedPipeA
GetUserDefaultUILanguage
GetUserDefaultLangID
OpenEventA
FlushViewOfFile
CreateFileA
GetSystemDefaultLCID
GetLastError
CreateEventA
HeapAlloc
ConvertDefaultLocale
GetEnvironmentStringsA
RtlFillMemory
GetCurrentThreadId
SetEvent
SetThreadExecutionState
EnumSystemLocalesA
MapViewOfFile
GetModuleHandleA
ConnectNamedPipe
GetProcessHeap
GetCurrentProcess
OpenThread
Sections
.text Size: 686KB - Virtual size: 688KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 308KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.resrc Size: 17KB - Virtual size: 516KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ