Static task
static1
Behavioral task
behavioral1
Sample
2094955f5cfb4a93ae07af807f19722b62ca9241e7741edd2fbbe39a86e13647.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2094955f5cfb4a93ae07af807f19722b62ca9241e7741edd2fbbe39a86e13647.exe
Resource
win10v2004-20220901-en
General
-
Target
2094955f5cfb4a93ae07af807f19722b62ca9241e7741edd2fbbe39a86e13647
-
Size
283KB
-
MD5
77d4f9c8ffd57ccab5994b91421b1ec0
-
SHA1
07a400ce8475b8f1b1cfbad9114a987a8b29bd79
-
SHA256
2094955f5cfb4a93ae07af807f19722b62ca9241e7741edd2fbbe39a86e13647
-
SHA512
6aea41953e5e5ad252575e19cc712c7f0e28ee420fac29f2a266ae825c3a45bd47dbb28ba5b78b6863ece19632a9ea27d750bf41541fc9666c9a480299cac380
-
SSDEEP
6144:Xo2zA5qwuv7nw4QeKkOaDdWcZlEKoDTvMV6c2UzQC5O:Xo2zWfuj7QTsDIm9KTvMVLxQx
Malware Config
Signatures
Files
-
2094955f5cfb4a93ae07af807f19722b62ca9241e7741edd2fbbe39a86e13647.exe windows x86
ef2df812a589bb4a7834db75fcba5f52
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
lstrcmpA
GetUserDefaultLCID
GetProcessHeap
HeapAlloc
IsValidLocale
SetUnhandledExceptionFilter
QueryPerformanceCounter
HeapFree
SystemTimeToFileTime
GetLocalTime
SetLastError
MultiByteToWideChar
GetCurrentProcessId
GetSystemDefaultLangID
GetTickCount
CloseHandle
LoadLibraryA
GetCurrentProcess
lstrcpyW
WideCharToMultiByte
GetSystemTimeAsFileTime
fmifs
DiskCopy
EnableVolumeCompression
Extend
FormatEx
Format
Chkdsk
w32topl
ToplScheduleCreate
ToplScheduleCacheDestroy
ToplScheduleCacheCreate
ToplSTHeapExtractMin
ToplSTHeapInit
ToplScheduleDuration
ToplScheduleExportReadonly
ToplSTHeapDestroy
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ