Static task
static1
Behavioral task
behavioral1
Sample
4f76b875dd7869ddb25e8eeb9600f434405e8e7edddbb1af59940f0d69470b1b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4f76b875dd7869ddb25e8eeb9600f434405e8e7edddbb1af59940f0d69470b1b.exe
Resource
win10v2004-20220901-en
General
-
Target
4f76b875dd7869ddb25e8eeb9600f434405e8e7edddbb1af59940f0d69470b1b
-
Size
299KB
-
MD5
483bdd265b09ddc2ba5df395d5eb5ad0
-
SHA1
609bf9e002c2b1a6b799473ac5078f07eff567e0
-
SHA256
4f76b875dd7869ddb25e8eeb9600f434405e8e7edddbb1af59940f0d69470b1b
-
SHA512
009d19045e62287b10bf978629c2928b7371d6cbaac3a76a4de30ea63374606fb0e4f8751a03f263680766983c51a641c6eb2a6eaaa08e3e7183ca85f2465ca0
-
SSDEEP
6144:MXEYh92rxPhrY5FLG1ZCjNfAQqURSQZWpqPkUQHEoClKl7p:MpINPaMZONfAQRJMQIHEoCcl9
Malware Config
Signatures
Files
-
4f76b875dd7869ddb25e8eeb9600f434405e8e7edddbb1af59940f0d69470b1b.exe windows x86
be62a640b7e8fcf746c8b7651d9d3912
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
HeapFree
GetUserDefaultLCID
HeapAlloc
GetSystemDefaultLangID
SetUnhandledExceptionFilter
lstrcpyW
GetSystemTimeAsFileTime
CloseHandle
GetProcessHeap
LoadLibraryA
GetLocalTime
MultiByteToWideChar
CreateFileA
GetCurrentProcessId
WideCharToMultiByte
SystemTimeToFileTime
QueryPerformanceCounter
GetTickCount
SetLastError
GetOEMCP
lstrcmpA
w32topl
ToplScheduleCacheCreate
ToplScheduleDuration
ToplSTHeapInit
ToplSTHeapExtractMin
ToplScheduleCacheDestroy
ToplScheduleExportReadonly
ToplSTHeapDestroy
ToplScheduleCreate
fmifs
DiskCopy
EnableVolumeCompression
Chkdsk
Extend
FormatEx
Format
Sections
.text Size: 240KB - Virtual size: 327KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iata Size: 53KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ